Search Torrents

PacktPub | Offensive Hacking Unfolded - Become A P...


PacktPub | Offensive Hacking Unfolded - Become A Pro Pentester [Video] [FCO] Torrent content (File list)
0. Websites you may like/1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 0.4 KB
0. Websites you may like/2. FTUApps.com Download Cracked Developers Applications For Free.url 0.2 KB
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp4 43.8 MB
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt 9.7 KB
1. Opening Lectures/2. Disclaimer.html 1.6 KB
1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html 2.5 KB
1. Opening Lectures/4. What can you do to get the most out of this course.mp4 36.2 MB
1. Opening Lectures/4. What can you do to get the most out of this course.srt 6.7 KB
1. Opening Lectures/5. How to get answers to your questions and help with problems.mp4 35.8 MB
1. Opening Lectures/5. How to get answers to your questions and help with problems.srt 7.1 KB
10. Happy Ending Lectures/1. How to go more advanced with this course.html 3.0 KB
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4 16.4 MB
10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt 2.9 KB
10. Happy Ending Lectures/3. What's your next step after doing this course.html 1.2 KB
10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp4 5.4 MB
10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt 3.1 KB
11. BONUS Section/1. Bonus Lecture.html 2.1 KB
2. Fundamentals/1. Lab Setup using the VMware Player.mp4 110.9 MB
2. Fundamentals/1. Lab Setup using the VMware Player.srt 17.6 KB
2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html 0.1 KB
2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html 0.1 KB
2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html 6.5 KB
2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html 2.0 KB
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4 184.3 MB
2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt 37.3 KB
3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4 113.5 MB
3. Information Gathering/1. Passive Reconnaissance - Part 1.srt 15.0 KB
3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4 136.7 MB
3. Information Gathering/2. Passive Reconnaissance - Part 2.srt 16.0 KB
3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4 129.4 MB
3. Information Gathering/3. Passive Reconnaissance - Part 3.srt 14.7 KB
3. Information Gathering/4. Store Passive Data in the Right Way.html 4.0 KB
3. Information Gathering/5. Active Reconnaissance - Part 1.mp4 87.3 MB
3. Information Gathering/5. Active Reconnaissance - Part 1.srt 13.2 KB
3. Information Gathering/6. Active Reconnaissance - Part 2.mp4 118.5 MB
3. Information Gathering/6. Active Reconnaissance - Part 2.srt 17.4 KB
3. Information Gathering/7. Active Reconnaissance - Part 3.mp4 75.8 MB
3. Information Gathering/7. Active Reconnaissance - Part 3.srt 13.7 KB
3. Information Gathering/8. Store Active Data in the Right Way.html 0.6 KB
3. Information Gathering/8.1 Target DB.xlsx 10.4 KB
4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html 1.0 KB
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4 235.2 MB
4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt 33.6 KB
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4 157.4 MB
4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt 28.9 KB
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp4 60.4 MB
4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt 12.8 KB
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4 258.8 MB
5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt 42.4 KB
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4 224.7 MB
5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt 39.0 KB
5. Exploitation/3. Essential Things You Should Know.html 1.1 KB
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4 111.6 MB
6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt 19.3 KB
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4 120.0 MB
6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt 18.4 KB
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4 57.7 MB
6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt 11.5 KB
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4 111.5 MB
6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt 18.2 KB
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4 237.5 MB
6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt 33.9 KB
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4 179.9 MB
6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt 24.7 KB
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4 124.8 MB
6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt 19.2 KB
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4 194.9 MB
6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt 34.9 KB
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4 144.7 MB
6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt 21.7 KB
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4 123.7 MB
6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt 18.6 KB
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4 123.6 MB
6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt 16.5 KB
7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html 1.5 KB
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp4 55.4 MB
7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt 10.0 KB
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4 167.2 MB
7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt 19.9 KB
7. Network PenTesting/13. Spawning Stable Shells.html 2.3 KB
7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4 128.8 MB
7. Network PenTesting/2. The Core of Network Testing - Part 1.srt 21.5 KB
7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4 213.4 MB
7. Network PenTesting/3. The Core of Network Testing - Part 2.srt 23.2 KB
7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4 101.4 MB
7. Network PenTesting/4. The Core of Network Testing - Part 3.srt 14.2 KB
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4 114.0 MB
7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt 17.6 KB
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp4 81.2 MB
7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt 15.2 KB
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp4 79.3 MB
7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt 13.9 KB
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4 158.3 MB
7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt 22.7 KB
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4 142.7 MB
7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt 22.3 KB
8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html 1.0 KB
8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html 3.1 KB
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp4 65.2 MB
8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.srt 14.4 KB
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4 221.4 MB
8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt 27.5 KB
9. Writing Great Reports/1. Clean Documentation in a Professional Test.mp4 141.1 MB
9. Writing Great Reports/1. Clean Documentation in a Professional Test.srt 32.9 KB
9. Writing Great Reports/2. Report Writing with Perfect Examples.html 1.0 KB
9. Writing Great Reports/2.1 PenTest Report (OHU).docx 973.8 KB
9. Writing Great Reports/2.2 PenTest Report (OHU).pdf 812.9 KB
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 0.3 KB



  • Torrent indexed: 1 year

  • Torrent updated: Thursday 31st of August 2023 05:30:47 PM
  • Torrent hash: E1241498D36E5D1FDD643DC1F2C90F3885111272

  • Torrent size: 5.1 GB

  • Torrent category: Tutorials




Comments



Report suspicious or fake torrent



Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
BTC: 13uHKcvKFUuJvkmX2XbDuxFHueDoqaeBSi