TorBT - Torrents and Magnet Links Search Engine

[ DevCourseWeb.com ] Udemy - Databases Hacking for Absolute Beginners

File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1. Introduction/1. Introduction.mp4
41 MB
~Get Your Files Here !/1. Introduction/1. Introduction.mp4.jpg
194 kB
~Get Your Files Here !/1. Introduction/1. Introduction.srt
6.3 kB
~Get Your Files Here !/2. Introduction to SQL/1. Introduction to SQL and databases.mp4
41 MB
~Get Your Files Here !/2. Introduction to SQL/1. Introduction to SQL and databases.srt
9.1 kB
~Get Your Files Here !/2. Introduction to SQL/2. Methods of databases hacking.mp4
36 MB
~Get Your Files Here !/2. Introduction to SQL/2. Methods of databases hacking.srt
7.8 kB
~Get Your Files Here !/3. building your lab/1. Download and Install Vmware.mp4
30 MB
~Get Your Files Here !/3. building your lab/1. Download and Install Vmware.srt
4.4 kB
~Get Your Files Here !/3. building your lab/2. Download and Install Virtualbox.mp4
91 MB
~Get Your Files Here !/3. building your lab/2. Download and Install Virtualbox.srt
9.5 kB
~Get Your Files Here !/3. building your lab/3. Download and Install Kali Linux.mp4
74 MB
~Get Your Files Here !/3. building your lab/3. Download and Install Kali Linux.srt
8.2 kB
~Get Your Files Here !/3. building your lab/4. take a look on kali Linux.mp4
49 MB
~Get Your Files Here !/3. building your lab/4. take a look on kali Linux.srt
6.0 kB
~Get Your Files Here !/3. building your lab/5. Download and Install Metasploitable2(vulnerable web application).mp4
71 MB
~Get Your Files Here !/3. building your lab/5. Download and Install Metasploitable2(vulnerable web application).srt
9.0 kB
~Get Your Files Here !/3. building your lab/6. Download and Install Windows 10 VM..mp4
34 MB
~Get Your Files Here !/3. building your lab/6. Download and Install Windows 10 VM..srt
5.7 kB
~Get Your Files Here !/3. building your lab/7. Finishing lab Settings part 1.mp4
15 MB
~Get Your Files Here !/3. building your lab/7. Finishing lab Settings part 1.srt
3.3 kB
~Get Your Files Here !/3. building your lab/8. Finishing lab Settings part 2.mp4
11 MB
~Get Your Files Here !/3. building your lab/8. Finishing lab Settings part 2.srt
1.7 kB
~Get Your Files Here !/4. Essentials System Commands/1. Essential System Commands Part 1.mp4
64 MB
~Get Your Files Here !/4. Essentials System Commands/1. Essential System Commands Part 1.srt
9.9 kB
~Get Your Files Here !/4. Essentials System Commands/2. Essential System Commands Part 2.mp4
76 MB
~Get Your Files Here !/4. Essentials System Commands/2. Essential System Commands Part 2.srt
9.8 kB
~Get Your Files Here !/4. Essentials System Commands/3. Essential System Commands Part 3.mp4
61 MB
~Get Your Files Here !/4. Essentials System Commands/3. Essential System Commands Part 3.srt
5.6 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/1. Test URL Using SQLMAP.mp4
112 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/1. Test URL Using SQLMAP.srt
13 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/10. Interactive OS shell with databases.mp4
29 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/10. Interactive OS shell with databases.srt
3.9 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/11. Interactive OS shell with Vulnerable web application.mp4
12 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/11. Interactive OS shell with Vulnerable web application.srt
2.0 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/12. PHP backdoor Access.mp4
68 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/12. PHP backdoor Access.srt
14 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/13. SQL Injection (Always True Scenario).mp4
20 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/13. SQL Injection (Always True Scenario).srt
5.5 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/14. SQL Injection get database version.mp4
34 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/14. SQL Injection get database version.srt
7.3 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/15. SQL Injection get database user.mp4
26 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/15. SQL Injection get database user.srt
5.6 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/16. SQL Injection get Database name.mp4
22 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/16. SQL Injection get Database name.srt
5.1 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/17. SQL Injection Get tables from Information_schema.mp4
29 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/17. SQL Injection Get tables from Information_schema.srt
6.3 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/18. SQL Injection get information about specific table in database.mp4
48 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/18. SQL Injection get information about specific table in database.srt
6.0 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/19. SQL Injection get access to columns in databases.mp4
62 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/19. SQL Injection get access to columns in databases.srt
7.8 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/2. Using SQLMAP with Vulnerable Web Application.mp4
60 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/2. Using SQLMAP with Vulnerable Web Application.srt
10 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/3. Access to available databases names.mp4
99 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/3. Access to available databases names.srt
11 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/4. Access to available tables in databases.mp4
37 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/4. Access to available tables in databases.srt
8.6 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/5. Access to available columns in databases.mp4
37 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/5. Access to available columns in databases.srt
6.9 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/6. Access tables and columns in Vulnerable Web Application.mp4
25 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/6. Access tables and columns in Vulnerable Web Application.srt
5.2 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/7. Access Passwords and Passwords Hashes in databases.mp4
57 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/7. Access Passwords and Passwords Hashes in databases.srt
11 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/8. Access to Databases Information-Schema.mp4
38 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/8. Access to Databases Information-Schema.srt
7.6 kB
~Get Your Files Here !/5. Databases Hacking and Assessment/9. Dumb data from databases Columns.mp4
83 MB
~Get Your Files Here !/5. Databases Hacking and Assessment/9. Dumb data from databases Columns.srt
11 kB
~Get Your Files Here !/6. Practical Hacking/1. Practice Reverse Shell Attack.mp4
112 MB
~Get Your Files Here !/6. Practical Hacking/1. Practice Reverse Shell Attack.srt
15 kB
~Get Your Files Here !/6. Practical Hacking/2. Password Cracking.mp4
50 MB
~Get Your Files Here !/6. Practical Hacking/2. Password Cracking.srt
7.7 kB
~Get Your Files Here !/6. Practical Hacking/3. Packet Sniffing.mp4
45 MB
~Get Your Files Here !/6. Practical Hacking/3. Packet Sniffing.srt
6.7 kB
~Get Your Files Here !/Bonus Resources.txt
386 B