TorBT - Torrents and Magnet Links Search Engine
[ WebToolTip.com ] The Art of Network Penetration Testing, Video Edition
- Date: 2026-05-18
- Size: 1.2 GB
- Files: 105
File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/001. Chapter 1. Network penetration testing.mp4
11 MB
~Get Your Files Here !/002. Chapter 1. How hackers break in.mp4
7.3 MB
~Get Your Files Here !/003. Chapter 1. Adversarial attack simulation - Penetration testing.mp4
16 MB
~Get Your Files Here !/004. Chapter 1. When a penetration test is least effective.mp4
12 MB
~Get Your Files Here !/005. Chapter 1. Executing a network penetration test.mp4
28 MB
~Get Your Files Here !/006. Chapter 1. Setting up your lab environment.mp4
3.2 MB
~Get Your Files Here !/007. Chapter 1. Building your own virtual pentest platform.mp4
22 MB
~Get Your Files Here !/008. Chapter 1. Summary.mp4
2.4 MB
~Get Your Files Here !/009. Part 1. Information gathering.mp4
3.3 MB
~Get Your Files Here !/010. Chapter 2. Discovering network hosts.mp4
23 MB
~Get Your Files Here !/011. Chapter 2. Internet Control Message Protocol.mp4
20 MB
~Get Your Files Here !/012. Chapter 2. Discovering hosts with Nmap.mp4
25 MB
~Get Your Files Here !/013. Chapter 2. Additional host-discovery methods.mp4
16 MB
~Get Your Files Here !/014. Chapter 2. Suummary.mp4
1.3 MB
~Get Your Files Here !/015. Chapter 3. Discovering network services.mp4
32 MB
~Get Your Files Here !/016. Chapter 3. Port scanning with Nmap.mp4
45 MB
~Get Your Files Here !/017. Chapter 3. Parsing XML output with Ruby.mp4
26 MB
~Get Your Files Here !/018. Chapter 3. Summary.mp4
2.3 MB
~Get Your Files Here !/019. Chapter 4. Discovering network vulnerabilities.mp4
18 MB
~Get Your Files Here !/020. Chapter 4. Discovering patching vulnerabilities.mp4
12 MB
~Get Your Files Here !/021. Chapter 4. Discovering authentication vulnerabilities.mp4
44 MB
~Get Your Files Here !/022. Chapter 4. Discovering configuration vulnerabilities.mp4
24 MB
~Get Your Files Here !/023. Chapter 4. Summary.mp4
2.7 MB
~Get Your Files Here !/024. Part 2. Focused penetration.mp4
4.2 MB
~Get Your Files Here !/025. Chapter 5. Attacking vulnerable web services.mp4
17 MB
~Get Your Files Here !/026. Chapter 5. Gaining an initial foothold.mp4
7.3 MB
~Get Your Files Here !/027. Chapter 5. Compromising a vulnerable Tomcat server.mp4
22 MB
~Get Your Files Here !/028. Chapter 5. Interactive vs. non-interactive shells.mp4
5.1 MB
~Get Your Files Here !/029. Chapter 5. Upgrading to an interactive shell.mp4
19 MB
~Get Your Files Here !/030. Chapter 5. Compromising a vulnerable Jenkins server.mp4
5.0 MB
~Get Your Files Here !/031. Chapter 5. Summary.mp4
2.3 MB
~Get Your Files Here !/032. Chapter 6. Attacking vulnerable database services.mp4
31 MB
~Get Your Files Here !/033. Chapter 6. Stealing Windows account password hashes.mp4
19 MB
~Get Your Files Here !/034. Chapter 6. Extracting password hashes with creddump.mp4
9.6 MB
~Get Your Files Here !/035. Chapter 6. Summary.mp4
2.3 MB
~Get Your Files Here !/036. Chapter 7. Attacking unpatched services.mp4
16 MB
~Get Your Files Here !/037. Chapter 7. Understanding the typical exploit life cycle.mp4
11 MB
~Get Your Files Here !/038. Chapter 7. Compromising MS17-010 with Metasploit.mp4
17 MB
~Get Your Files Here !/039. Chapter 7. The Meterpreter shell payload.mp4
20 MB
~Get Your Files Here !/040. Chapter 7. Cautions about the public exploit database.mp4
11 MB
~Get Your Files Here !/041. Chapter 7. Summary.mp4
3.5 MB
~Get Your Files Here !/042. Part 3. Post-exploitation and privilege escalation.mp4
3.6 MB
~Get Your Files Here !/043. Chapter 8. Windows post-exploitation.mp4
18 MB
~Get Your Files Here !/044. Chapter 8. Maintaining reliable re-entry with Meterpreter.mp4
13 MB
~Get Your Files Here !/045. Chapter 8. Harvesting credentials with Mimikatz.mp4
8.5 MB
~Get Your Files Here !/046. Chapter 8. Harvesting domain cached credentials.mp4
22 MB
~Get Your Files Here !/047. Chapter 8. Harvesting credentials from the filesystem.mp4
13 MB
~Get Your Files Here !/048. Chapter 8. Moving laterally with Pass-the-Hash.mp4
20 MB
~Get Your Files Here !/049. Chapter 8. Summary.mp4
2.4 MB
~Get Your Files Here !/050. Chapter 9. Linux or UNIX post-exploitation.mp4
31 MB
~Get Your Files Here !/051. Chapter 9. Harvesting credentials.mp4
18 MB
~Get Your Files Here !/052. Chapter 9. Escalating privileges with SUID binaries.mp4
24 MB
~Get Your Files Here !/053. Chapter 9. Passing around SSH keys.mp4
17 MB
~Get Your Files Here !/054. Chapter 9. Summary.mp4
2.1 MB
~Get Your Files Here !/055. Chapter 10. Controlling the entire network.mp4
26 MB
~Get Your Files Here !/056. Chapter 10. Obtaining domain admin privileges.mp4
18 MB
~Get Your Files Here !/057. Chapter 10. ntds.dit and the keys to the kingdom.mp4
23 MB
~Get Your Files Here !/058. Chapter 10. Summary.mp4
3.2 MB
~Get Your Files Here !/059. Part 4. Documentation.mp4
4.1 MB
~Get Your Files Here !/060. Chapter 11. Post-engagement cleanup.mp4
16 MB
~Get Your Files Here !/061. Chapter 11. Deactivating local user accounts.mp4
6.6 MB
~Get Your Files Here !/062. Chapter 11. Removing leftover files from the filesystem.mp4
19 MB
~Get Your Files Here !/063. Chapter 11. Reversing configuration changes.mp4
15 MB
~Get Your Files Here !/064. Chapter 11. Closing backdoors.mp4
15 MB
~Get Your Files Here !/065. Chapter 11. Summary.mp4
2.7 MB
~Get Your Files Here !/066. Chapter 12. Writing a solid pentest deliverable.mp4
15 MB
~Get Your Files Here !/067. Chapter 12. Executive summary.mp4
6.7 MB
~Get Your Files Here !/068. Chapter 12. Engagement methodology.mp4
7.1 MB
~Get Your Files Here !/069. Chapter 12. Attack narrative.mp4
2.7 MB
~Get Your Files Here !/070. Chapter 12. Technical observations.mp4
15 MB
~Get Your Files Here !/071. Chapter 12. Appendices.mp4
17 MB
~Get Your Files Here !/072. Chapter 12. Wrapping it up.mp4
11 MB
~Get Your Files Here !/073. Chapter 12. What now.mp4
4.2 MB
~Get Your Files Here !/074. Chapter 12. Summary.mp4
3.3 MB
~Get Your Files Here !/075. Appendix A. Building a virtual pentest platform.mp4
12 MB
~Get Your Files Here !/076. Appendix A. Additional OS dependencies.mp4
12 MB
~Get Your Files Here !/077. Appendix A. Installing Nmap.mp4
23 MB
~Get Your Files Here !/078. Appendix A. The Ruby scripting language.mp4
25 MB
~Get Your Files Here !/079. Appendix A. The Metasploit framework.mp4
25 MB
~Get Your Files Here !/080. Appendix B. Essential Linux commands.mp4
15 MB
~Get Your Files Here !/081. Appendix B. tmux.mp4
15 MB
~Get Your Files Here !/082. Appendix C. Creating the Capsulecorp Pentest lab network.mp4
12 MB
~Get Your Files Here !/083. Appendix C. Creating the primary Windows servers.mp4
16 MB
~Get Your Files Here !/084. Appendix C. Creating the Linux servers.mp4
3.4 MB
~Get Your Files Here !/085. Appendix D. Capsulecorp internal network penetration test report.mp4
6.8 MB
~Get Your Files Here !/086. Appendix D. Engagement methodology.mp4
11 MB
~Get Your Files Here !/087. Appendix D. Attack narrative.mp4
5.9 MB
~Get Your Files Here !/088. Appendix D. Technical observations.mp4
1.7 MB
~Get Your Files Here !/089. Appendix D. Appendix 1 - Severity definitions.mp4
3.6 MB
~Get Your Files Here !/090. Appendix D. Appendix 2 - Hosts and services.mp4
758 kB
~Get Your Files Here !/091. Appendix D. Appendix 3 - Tools list.mp4
1.9 MB
~Get Your Files Here !/092. Appendix D. Appendix 4 - Additional references.mp4
1.5 MB
~Get Your Files Here !/093. Appendix E. Exercise answers.mp4
2.0 MB
~Get Your Files Here !/094. Appendix E. Exercise 3.1 - Creating protocol-specific target lists.mp4
3.1 MB
~Get Your Files Here !/095. Appendix E. Exercise 4.1 - Identifying missing patches.mp4
923 kB
~Get Your Files Here !/096. Appendix E. Exercise 4.2 - Creating a client-specific password list.mp4
972 kB
~Get Your Files Here !/097. Appendix E. Exercise 4.3 - Discovering weak passwords.mp4
2.2 MB
~Get Your Files Here !/098. Appendix E. Exercise 5.1 - Deploying a malicious WAR file.mp4
1023 kB
~Get Your Files Here !/099. Appendix E. Exercise 6.1 Stealing SYSTEM and SAM registry hives.mp4
925 kB
~Get Your Files Here !/100. Appendix E. Exercise 7.1 - Compromising tien.capsulecorp.local.mp4
747 kB
~Get Your Files Here !/101. Appendix E. Exercise 8.1 - Accessing your first level-two host.mp4
506 kB
~Get Your Files Here !/102. Appendix E. Exercise 10.1 - Stealing passwords from ntds.dit.mp4
2.0 MB
~Get Your Files Here !/103. Appendix E. Exercise 11.1 - Performing post-engagement cleanup.mp4
1.7 MB
~Get Your Files Here !/Bonus Resources.txt
70 B