zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
CBTNugget - Penetration Testing Tools
magnet:?xt=urn:btih:9f3f12e0c12efd3fe1419c2bd850f46379855353&dn=CBTNugget - Penetration Testing Tools
磁力链接详情
Hash值:
9f3f12e0c12efd3fe1419c2bd850f46379855353
点击数:
109
文件大小:
6.46 GB
文件数量:
146
创建日期:
2023-12-26 10:40
最后访问:
2024-12-25 13:30
访问标签:
CBTNugget
-
Penetration
Testing
Tools
文件列表详情
1. Pentesting Reconnaissance.mp4 25.5 MB
2. Pentesting Reconnaissance Tools.mp4 41.13 MB
3. Domain Information Tools.mp4 72.45 MB
4. IP and DNS Information Tools.mp4 51.77 MB
5. Combination OSINT Tools.mp4 72.33 MB
6. Breach Data Tools.mp4 24.75 MB
7. Pentesting Reconnaissance Review.mp4 16.61 MB
8. Intro to Pentesting Enumeration.mp4 44.64 MB
9. Pentest Enumeration Tools.mp4 52.15 MB
10. Basic NMAP Commands.mp4 28.15 MB
11. Ping Scans with NMAP.mp4 22.39 MB
12. Scanning TCP and UDP with NMAP.mp4 32.43 MB
13. Identifying Host Attributes with NMAP.mp4 38.24 MB
14. Using NMAP Scripts.mp4 33.77 MB
15. Bypassing Firewalls with NMAP.mp4 34.11 MB
16. Intro to Enumerating Services and Vulnerabilities.mp4 14.16 MB
17. Enumerating with Port Scanners.mp4 96.16 MB
18. Enumerating Web Servers.mp4 113.66 MB
19. Enumerating SMB and Shares.mp4 61.81 MB
20. Enumerating Vulnerabilities with Nessus.mp4 89.18 MB
21. Automating Enumeration.mp4 52.23 MB
22. Pentest Enumeration Review.mp4 18.6 MB
23. Social Engineering Anatomy.mp4 57.09 MB
24. Social Engineering Attacks.mp4 40.3 MB
25. Social Engineering Tools.mp4 40.33 MB
26. Social Engineering Toolkit.mp4 97.54 MB
27. Using WifiPhisher.mp4 17.21 MB
28. Pharming With ShellPhish.mp4 36.56 MB
29. Social Engineering Review.mp4 20.75 MB
30. Exploits and Payloads.mp4 40.28 MB
31. Moving Files With PwnDrop.mp4 69.6 MB
32. Transferring Files with SMB and SCP.mp4 49.21 MB
33. Working With Exploits.mp4 103.67 MB
34. Working With Payloads.mp4 46.84 MB
35. Exploits and Payloads Review.mp4 8.91 MB
36. Intro to the Metasploit Framework.mp4 23.83 MB
37. Metasploit Startup and Workspaces.mp4 40.38 MB
38. Metasploit Modules.mp4 68.38 MB
39. Metasploit Options and Payloads.mp4 83.33 MB
40. Managing Metasploit Sessions.mp4 22.68 MB
41. Using Meterpreter.mp4 68.46 MB
42. Metasploit Framework Review.mp4 10.41 MB
43. Network Based Attacks and Tools.mp4 53.3 MB
44. How Attacks Against ARP Work.mp4 31.76 MB
45. ARP Poisoning Attack.mp4 43.24 MB
46. How DNS Cache Poisoning Works.mp4 23.34 MB
47. DNS Cache Poisoning Attack.mp4 29.73 MB
48. VLAN Hopping Attacks.mp4 22.17 MB
49. Bypassing Network Access Control.mp4 20.5 MB
50. Network Based Attacks Review.mp4 33.19 MB
51. Host Protocol Attacks and Tools Overview.mp4 25.23 MB
52. Server Message Block (SMB) Protocol.mp4 25.12 MB
53. Attacking the SMB Protocol.mp4 70.66 MB
54. Simple Network Management Protocol (SNMP).mp4 34.5 MB
55. Exploiting the SNMP Protocol.mp4 83.13 MB
56. Denial of Service Attacks.mp4 32.51 MB
57. Analyzing the LLMNR Protocol.mp4 25.72 MB
58. Attacking the LLMNR Protocol.mp4 35.01 MB
59. Host Protocol Attacks and Tools Review.mp4 18.62 MB
60. Wireless and Mobile Device Attacks and Tools.mp4 42.26 MB
61. Sniffing Wireless Data.mp4 39.96 MB
62. Wireless Analysis With Kismet.mp4 42.73 MB
63. Wireless Deauthentication Attacks.mp4 24.49 MB
64. Cracking WPA2 Preshared Keys.mp4 31.99 MB
65. Wireless Evil Twin Attack.mp4 55.69 MB
66. Automated Wifi Attack Tools.mp4 34.22 MB
67. Section Review.mp4 21.55 MB
68. OWASP Top 10 (1 thru 3).mp4 56.69 MB
69. OWASP Top 10 (4 thru 6).mp4 36.73 MB
70. OWASP Top 10 (7 thru 10).mp4 44.92 MB
71. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF).mp4 29.4 MB
72. SQL Injection Attacks.mp4 26 MB
73. File Inclusion Vulnerabilities.mp4 38.74 MB
74. Additional Web App Vulnerabilities and Attacks.mp4 30.27 MB
75. Web Application Pentesting.mp4 20.75 MB
76. OWASP ZAP.mp4 72.53 MB
77. Attack Scans Using OWASP ZAP.mp4 42.23 MB
78. Brute Force Attack Using OWASP ZAP.mp4 52.2 MB
79. SQL Injection Using SQLmap.mp4 72.33 MB
80. Local and Remote File Inclusion Attacks.mp4 48.73 MB
81. Cross Site Scripting (XSS) Attacks.mp4 30.67 MB
82. Bind and Reverse Shells.mp4 36.35 MB
83. The Power of Web Shells.mp4 56.79 MB
84. Working With Bind and Reverse Shells.mp4 28.62 MB
85. Shell One-Liners.mp4 24.13 MB
86. Spawning Meterpreter Shells.mp4 57.35 MB
87. Log Poisoning for a Shell.mp4 58.11 MB
88. Windows Privilege Escalation Pt.1.mp4 36.01 MB
89. Windows Privilege Escalation Pt.2.mp4 28.9 MB
90. Getting a Windows Shell.mp4 58.04 MB
91. Windows Local Host Enumeration.mp4 49.66 MB
92. Windows Unquoted Service Path Vulnerability.mp4 46.29 MB
93. Windows Local Exploit Privilege Escalation.mp4 86.63 MB
94. Introduction to Privilege Escalation.mp4 46.33 MB
95. Linux Privilege Escalation Pt.1.mp4 29.92 MB
96. Linux Privilege Escalation Pt.2.mp4 33.19 MB
97. Linux Shell Escalation.mp4 30.62 MB
98. Linux Local Host Enumeration.mp4 61.53 MB
99. Linux Privilege Escalation Via Cron Jobs.mp4 45.48 MB
100. Linux SUID and SUDO privilege escalation.mp4 41.4 MB
101. Linux Local Exploit Privilege Escalation.mp4 80.35 MB
102. Physical Pentest Documents.mp4 38.32 MB
103. Reconnaissance and Planning.mp4 29.21 MB
104. Physical Pentest Tools.mp4 53.19 MB
105. Getting Inside.mp4 33.55 MB
106. Continuing From the Inside.mp4 31.17 MB
107. Physical Pentest Report.mp4 28.05 MB
108. Credential Attacks Pt.1.mp4 38.03 MB
109Credential Attacks Pt.2.mp4 42.88 MB
110. Creating Custom Wordlists.mp4 61.02 MB
111. Performing a Brute Force Attack.mp4 50.49 MB
112. Cracking Hashed Passwords.mp4 73.04 MB
113. Executing a Pass the Hash Attack.mp4 27.85 MB
114. Credential Harvesting and PrivEsc in the Cloud.mp4 55.68 MB
115. Running PACU.mp4 55.83 MB
116. Misconfigured Cloud Assets.mp4 39.84 MB
117. Running CloudSploit.mp4 59.57 MB
118. Resource Exhaustion, Malware Injection and API Attacks.mp4 29.37 MB
119. Side Channel and Direct-To-Origin Attacks.mp4 32.23 MB
120. Additional Cloud Pentesting Tools.mp4 20.81 MB
121. Mobile Device Attacks.mp4 20.24 MB
122. Mobile Device Vulnerabilities.mp4 46.57 MB
123. Mobile Security Tools.mp4 26.63 MB
124. Internet of Things (IoT) Devices.mp4 39.67 MB
125. Data Storage System Vulnerabilities.mp4 34.86 MB
126. SCADA, IIoT and ICS Vulnerabilities.mp4 28.14 MB
127. Virtual Environment Vulnerabilities.mp4 28.36 MB
128. Establishing Persistence.mp4 23.17 MB
129. Lateral Movement.mp4 41.89 MB
130. Data Exfiltration.mp4 30.77 MB
131. Covering Your Tracks.mp4 30.1 MB
132. Linux Post Exploit Activities.mp4 63.92 MB
133. Windows Post Exploit Activities.mp4 72.93 MB
134. Analyze a Basic Script.mp4 81.59 MB
135. Scripting Basics.mp4 123.19 MB
136. Assigning Values to Variables.mp4 87.12 MB
137. Operating on Variables with Operators.mp4 77.36 MB
138. Branching Code with Conditionals.mp4 83.93 MB
139. Reapeating Code with Loops.mp4 91.3 MB
140. Handling Errors in Code.mp4 88.65 MB
141. Intro.mp4 16.59 MB
142. Analyzing PING Scripts.mp4 58.03 MB
143. Downloading Files with Scripts.mp4 23.37 MB
144. Automation with Scripts.mp4 85.48 MB
145. Updating IP Settings with a Script.mp4 37.46 MB
146. NMAP Reports in HTML.mp4 49.24 MB
其他位置