[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fb1dbOOLBMkAYbnx6BDRqPj68esZB9ZCgSpKxpvGKbhc":3},{"id":4,"name":5,"category_id":6,"subcategory_id":7,"uploaded_by":8,"downloads":9,"size":10,"seeders":11,"leechers":12,"infohash":13,"language":14,"title":15,"slogan":15,"poster_alt":15,"description":15,"cover_image":15,"magnet_link":16,"stream_link":15,"content":17,"files":18,"comments_count":19,"tracker_list":20,"date_uploaded":21,"last_checked":21,"last_checked_at":15,"user_id":15,"submit_flag":12,"uploaded_at":22,"created_at":23,"updated_at":24,"slugged_title":25,"category_name":26,"subcategory_name":27,"uploaded_ago":28,"category":29,"subcategory":30,"comments":32},6458472,"OSCP PEN-200: Penetration Testing with Kali Linux [2023]",9,34,"hazing4864",872,"3.0 GB",21,1,"8A232F203CC140B3B04B7F7B67427ED00533ACB5","English",null,"magnet:?xt=urn:btih:8A232F203CC140B3B04B7F7B67427ED00533ACB5&dn=OSCP+PEN-200%3A+Penetration+Testing+with+Kali+Linux+%5B2023%5D&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce","\u003Cp>Course link - \u003Ca target=\"_blank\" href=\"https://www.offsec.com/courses/pen-200/\">https://www.offsec.com/courses/pen-200/\u003C/a>\n\u003Cbr>\u003Cbr>\u003C/p>\u003Cdiv class=\"torrent-work\">\u003Cdiv class=\"torrent-work-heading\">\u003Ch2>Quote:\u003C/h2>\u003C/div>\u003C!-- torrent-work-heading -->\u003Cdiv class=\"torrent-work-detail no-top-radius\">\u003Cspan class=\"icon-left\">\u003Ci class=\"flaticon-quote-right\">\u003C/i>\u003C/span>The Penetration Testing with Kali Linux (PEN-200) course is OffSec’s essential training program for aspiring penetration testers. The course teaches learners how to identify and exploit real-world vulnerabilities across computers, network security, web applications, and basic cloud environments. Emphasizing hands-on, practical learning, PEN-200 provides the core technical skills and mindset required to simulate offensive information security operations—and defend against them. It’s a critical resource for those pursuing roles such as security analyst, security specialist, or certified ethical hacker.\u003Cspan class=\"icon-right\">\u003Ci class=\"flaticon-quote-left\">\u003C/i>\u003C/span>\u003C/div>\u003C!-- torrent-work-detail -->\u003C/div>\u003C!-- torrent-work -->\u003Cp>\n\u003Cbr>\u003Cbr>\u003Cbr>\u003Cstrong>Quality  \u003C/strong>\n\u003Cbr>\u003Cbr>\u003C/p>\u003Cdiv class=\"torrent-work green\">\u003Cdiv class=\"torrent-work-heading\">\u003Ch2>Code:\u003C/h2>\u003C/div>\u003C!-- torrent-work-heading -->\u003Cdiv class=\"torrent-work-detail no-top-radius\">\u003Cspan class=\"icon-left\">\u003Ci class=\"flaticon-hash-tag\">\u003C/i>\u003C/span>\n\u003Cbr>General\n\u003Cbr>Complete name &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: PEN-200 - Penetration Testing with Kali Linux Videos\\10. LOCATING PUBLIC EXPLOITS\\10.2. Exploiting a Target\\10.2.1. Putting It Together.mp4\n\u003Cbr>Format &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : MPEG-4\n\u003Cbr>Format profile &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : Base Media\n\u003Cbr>Codec ID &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : isom (isom/iso2/avc1/mp41)\n\u003Cbr>File size &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 34.5 MiB\n\u003Cbr>Duration &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 8 min 45 s\n\u003Cbr>Overall bit rate &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 551 kb/s\n\u003Cbr>Frame rate &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 30.000 FPS\n\u003Cbr>Writing application &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Lavf58.45.100\n\u003Cbr>\u003Cbr>Video\n\u003Cbr>ID &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 1\n\u003Cbr>Format &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : AVC\n\u003Cbr>Format/Info &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Advanced Video Codec\n\u003Cbr>Format profile &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : \u003Ca href=\"/cdn-cgi/l/email-protection\" class=\"__cf_email__\" data-cfemail=\"2169484649616d120f13\">[email&nbsp;protected]\u003C/a>\n\u003Cbr>Format settings &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: CABAC / 5 Ref Frames\n\u003Cbr>Format settings, CABAC &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : Yes\n\u003Cbr>Format settings, Reference frames &nbsp; &nbsp; &nbsp; &nbsp;: 5 frames\n\u003Cbr>Codec ID &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : avc1\n\u003Cbr>Codec ID/Info &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Advanced Video Coding\n\u003Cbr>Duration &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 8 min 44 s\n\u003Cbr>Bit rate &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 353 kb/s\n\u003Cbr>Width &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 1 280 pixels\n\u003Cbr>Height &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 720 pixels\n\u003Cbr>Display aspect ratio &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 16:9\n\u003Cbr>Frame rate mode &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Constant\n\u003Cbr>Frame rate &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 30.000 FPS\n\u003Cbr>Color space &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: YUV\n\u003Cbr>Chroma subsampling &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 4:2:0\n\u003Cbr>Bit depth &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 8 bits\n\u003Cbr>Scan type &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Progressive\n\u003Cbr>Bits/(Pixel*Frame) &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 0.013\n\u003Cbr>Stream size &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 22.1 MiB (64%)\n\u003Cbr>Writing library &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: x264 core 161 r3027 4121277\n\u003Cbr>Encoding settings &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: cabac=1 / ref=5 / deblock=1:0:0 / analyse=0x3:0x113 / me=hex / subme=8 / psy=1 / psy_rd=1.00:0.00 / mixed_ref=1 / me_range=16 / chroma_me=1 / trellis=2 / 8x8dct=1 / cqm=0 / deadzone=21,11 / fast_pskip=1 / chroma_qp_offset=-2 / threads=2 / lookahead_threads=1 / sliced_threads=0 / nr=0 / decimate=1 / interlaced=0 / bluray_compat=0 / stitchable=1 / constrained_intra=0 / bframes=3 / b_pyramid=2 / b_adapt=2 / b_bias=0 / direct=3 / weightb=1 / open_gop=0 / weightp=2 / keyint=infinite / keyint_min=30 / scenecut=40 / intra_refresh=0 / rc_lookahead=50 / rc=crf / mbtree=1 / crf=20.0 / qcomp=0.60 / qpmin=5 / qpmax=69 / qpstep=4 / vbv_maxrate=2750 / vbv_bufsize=7500 / crf_max=0.0 / nal_hrd=none / filler=0 / ip_ratio=1.40 / aq=1:1.00\n\u003Cbr>Color range &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Limited\n\u003Cbr>Color primaries &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: BT.709\n\u003Cbr>Transfer characteristics &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : BT.709\n\u003Cbr>Matrix coefficients &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: BT.709\n\u003Cbr>Codec configuration box &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: avcC\n\u003Cbr>\u003Cbr>Audio\n\u003Cbr>ID &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 2\n\u003Cbr>Format &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : AAC LC\n\u003Cbr>Format/Info &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Advanced Audio Codec Low Complexity\n\u003Cbr>Codec ID &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : mp4a-40-2\n\u003Cbr>Duration &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 8 min 45 s\n\u003Cbr>Bit rate mode &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Constant\n\u003Cbr>Bit rate &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 192 kb/s\n\u003Cbr>Channel(s) &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 2 channels\n\u003Cbr>Channel layout &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : L R\n\u003Cbr>Sampling rate &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 48.0 kHz\n\u003Cbr>Frame rate &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : 46.875 FPS (1024 SPF)\n\u003Cbr>Compression mode &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : Lossy\n\u003Cbr>Stream size &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 11.9 MiB (34%)\n\u003Cbr>Default &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: Yes\n\u003Cbr>Alternate group &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;: 1\n\u003Cbr>\u003Cspan class=\"icon-right\">\u003Ci class=\"flaticon-hash-tag\">\u003C/i>\u003C/span>\u003C/div>\u003C!-- torrent-work-detail -->\u003C/div>\u003C!-- torrent-work -->\u003Cp>\n\u003Cbr>\u003C/p>","\u003Ch2>Files: \u003C/h2>\n\n                \u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>PEN-200\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>PEN-200 - Penetration Testing with Kali Linux Videos\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>12. LINUX PRIVILEGE ESCALATION\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>12.1. Enumerating Linux\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.1.1. Manual Enumeration.mp4 (78.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.1.1. Manual Enumeration.vtt (24.6 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.1.2. Automated Enumeration.mp4 (11.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.1.2. Automated Enumeration.vtt (3.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>12.2. Exposed Confidential Information\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.2.1. Inspecting User Trails.mp4 (16.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.2.1. Inspecting User Trails.vtt (5.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.2.2. Inspecting Service Footprints.mp4 (7.7 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.2.2. Inspecting Service Footprints.vtt (3.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>12.3. Insecure File Permissions\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.3.1. Abusing Cron Jobs.mp4 (10.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.3.1. Abusing Cron Jobs.vtt (3.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.3.2. Abusing Password Authentication.mp4 (7.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.3.2. Abusing Password Authentication.vtt (3.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>12.4. Insecure System Components\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.4.1. Abusing Setuid Binaries and Capabilities.mp4 (21.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.4.1. Abusing Setuid Binaries and Capabilities.vtt (8.0 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.4.2. Abusing Sudo.mp4 (15.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.4.2. Abusing Sudo.vtt (3.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>12.4.3. Exploiting Kernel Vulnerabilities.mp4 (15.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>12.4.3. Exploiting Kernel Vulnerabilities.vtt (5.6 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>01. INFORMATION GATHERING\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>1.1. Passive Information Gathering\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.1.1. Whois Enumeration.mp4 (7.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.1.1. Whois Enumeration.vtt (1.8 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.1.2. Google Hacking.mp4 (13.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.1.2. Google Hacking.vtt (4.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.1.3. Netcraft.mp4 (6.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.1.3. Netcraft.vtt (1.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.1.4. Open-Source Code.mp4 (5.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.1.4. Open-Source Code.vtt (1.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.1.5. Shodan.mp4 (9.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.1.5. Shodan.vtt (2.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.1.6. Security Headers and SSL_TLS.mp4 (7.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.1.6. Security Headers and SSL_TLS.vtt (2.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>1.2. Active Information Gathering\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.2.1. DNS Enumeration.mp4 (31.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.2.1. DNS Enumeration.vtt (9.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.2.2. Port Scanning with Nmap.mp4 (41.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.2.2. Port Scanning with Nmap.vtt (16.8 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.2.3. SMB Enumeration.mp4 (12.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.2.3. SMB Enumeration.vtt (4.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.2.4. SMTP Enumeration.mp4 (8.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.2.4. SMTP Enumeration.vtt (2.6 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>1.2.5. SNMP Enumeration.mp4 (19.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>1.2.5. SNMP Enumeration.vtt (6.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>02. VULNERABILITY SCANNING\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>2.1. Vulnerability Scanning with Nessus\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>2.1.1. Nessus Components.mp4 (17.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>2.1.1. Nessus Components.vtt (4.4 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>2.1.2. Performing a Vulnerability Scan.mp4 (16.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>2.1.2. Performing a Vulnerability Scan.vtt (5.8 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>2.1.3. Analyzing the Results.mp4 (22.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>2.1.3. Analyzing the Results.vtt (6.6 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>2.1.4. Performing an Authenticated Vulnerability Scan.mp4 (20.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>2.1.4. Performing an Authenticated Vulnerability Scan.vtt (6.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>2.1.5. Working with Nessus Plugins.mp4 (22.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>2.1.5. Working with Nessus Plugins.vtt (5.3 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>2.2. Vulnerability Scanning with Nmap\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>2.2.1. NSE Vulnerability Scripts.mp4 (20.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>2.2.1. NSE Vulnerability Scripts.vtt (5.2 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>2.2.2. Working with NSE Scripts.mp4 (12.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>2.2.2. Working with NSE Scripts.vtt (3.3 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>03. INTRODUCTION TO WEB APPLICATION ATTACKS\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>3.1. Web Application Assessment Tools\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>3.1.1. Fingerprinting Web Servers with Nmap.mp4 (3.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>3.1.1. Fingerprinting Web Servers with Nmap.vtt (1.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>3.1.2. Directory Brute Force with Gobuster.mp4 (4.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>3.1.2. Directory Brute Force with Gobuster.vtt (1.6 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>3.1.3. Security Testing with Burp Suite.mp4 (34.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>3.1.3. Security Testing with Burp Suite.vtt (9.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>3.2. Web Application Enumeration\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>3.2.1. Debugging Page Content.mp4 (13.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>3.2.1. Debugging Page Content.vtt (3.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>3.2.2. Inspecting HTTP Response Headers and Sitemaps.mp4 (12.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>3.2.2. Inspecting HTTP Response Headers and Sitemaps.vtt (3.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>3.2.3. Enumerating and Abusing APIs.mp4 (28.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>3.2.3. Enumerating and Abusing APIs.vtt (10.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>3.3. Cross-Site Scripting\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>3.3.1. Basic XSS.mp4 (15.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>3.3.1. Basic XSS.vtt (3.1 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>3.3.2. Privilege Escalation via XSS.mp4 (34.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>3.3.2. Privilege Escalation via XSS.vtt (9.3 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>04. COMMON WEB APPLICATION ATTACKS\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>4.1. Directory Traversal\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.1.1. Absolute vs Relative Paths.mp4 (14.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.1.1. Absolute vs Relative Paths.vtt (4.4 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.1.2. Identifying and Exploiting Directory Traversals.mp4 (38.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.1.2. Identifying and Exploiting Directory Traversals.vtt (8.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.1.3. Encoding Special Characters.mp4 (5.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.1.3. Encoding Special Characters.vtt (2.3 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>4.2. File Inclusion Vulnerabilities\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.2.1. Local File Inclusion (LFI).mp4 (45.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.2.1. Local File Inclusion (LFI).vtt (9.2 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.2.2. PHP Wrappers.mp4 (16.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.2.2. PHP Wrappers.vtt (5.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.2.3. Remote File Inclusion (RFI).mp4 (7.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.2.3. Remote File Inclusion (RFI).vtt (3.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>4.3. File Upload Vulnerabilities\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.3.1. Using Executable Files.mp4 (29.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.3.1. Using Executable Files.vtt (7.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.3.2. Using Non-Executable Files.mp4 (29.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.3.2. Using Non-Executable Files.vtt (7.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>4.4. Command Injection\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>4.4.1. OS Command Injection.mp4 (23.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>4.4.1. OS Command Injection.vtt (7.7 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>05. SQL INJECTION ATTACKS\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>5.1. SQL Theory and Databases\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>5.1.1. DB Types and Characteristics.mp4 (12.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>5.1.1. DB Types and Characteristics.vtt (5.6 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>5.2. Manual SQL Exploitation\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>5.2.1. Identifying SQLi via Error-based Paylaods.mp4 (12.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>5.2.1. Identifying SQLi via Error-based Paylaods.vtt (5.2 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>5.2.2. UNION-based Payloads.mp4 (14.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>5.2.2. UNION-based Payloads.vtt (6.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>5.2.3. Blind SQL Injections.mp4 (7.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>5.2.3. Blind SQL Injections.vtt (3.3 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>5.3. Manual and Automated Code Execution\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>5.3.1. Manual Code Execution.mp4 (11.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>5.3.1. Manual Code Execution.vtt (4.2 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>5.3.2. Automating the Attack.mp4 (24.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>5.3.2. Automating the Attack.vtt (3.6 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>06. CLIENT-SIDE ATTACKS\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>6.1. Target Reconnaissance\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>6.1.1. Information Gathering.mp4 (12.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>6.1.1. Information Gathering.vtt (4.1 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>6.1.2. Client Fingerprinting.mp4 (16.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>6.1.2. Client Fingerprinting.vtt (6.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>6.2. Exploiting Microsoft Office\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>6.2.1. Leveraging Microsoft Word Macros.mp4 (38.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>6.2.1. Leveraging Microsoft Word Macros.vtt (8.8 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>6.3. Abusing Windows Library Files\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>6.3.1. Obtaining Code Execution via Windows Library Files.mp4 (45.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>6.3.1. Obtaining Code Execution via Windows Library Files.vtt (13.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>07. ANTIVIRUS EVASION\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>7.1. Antivirus Software Key Components and Operations\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>7.1.1. Detection Methods.mp4 (19.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>7.1.1. Detection Methods.vtt (6.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>7.2. AV Evasion in Practice\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>7.2.1. Evading AV with Thread Injection.mp4 (56.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>7.2.1. Evading AV with Thread Injection.vtt (10.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>7.2.2. Automating the Process.mp4 (27.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>7.2.2. Automating the Process.vtt (7.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>08. PASSWORD ATTACKS\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>8.1. Attacking Network Services Logins\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.1.1. SSH and RDP.mp4 (14.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.1.1. SSH and RDP.vtt (3.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.1.2. HTTP POST Login Form.mp4 (20.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.1.2. HTTP POST Login Form.vtt (5.8 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>8.2. Password Cracking Fundamentals\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.2.1. Introduction to Encryption, Hashes and Cracking.mp4 (20.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.2.1. Introduction to Encryption, Hashes and Cracking.vtt (8.2 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.2.2. Mutating Wordlists.mp4 (32.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.2.2. Mutating Wordlists.vtt (12.4 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.2.3. Password Manager.mp4 (29.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.2.3. Password Manager.vtt (6.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.2.4. SSH Private Key Passphrase.mp4 (33.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.2.4. SSH Private Key Passphrase.vtt (8.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>8.3. Working with Password Hashes\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.3.1. Cracking NTLM.mp4 (26.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.3.1. Cracking NTLM.vtt (5.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.3.2. Passing NTLM.mp4 (28.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.3.2. Passing NTLM.vtt (7.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.3.3. Cracking Net-NTLMv2.mp4 (21.7 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.3.3. Cracking Net-NTLMv2.vtt (4.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>8.3.4. Relaying Net-NTLMv2.mp4 (17.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>8.3.4. Relaying Net-NTLMv2.vtt (4.3 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>09. FIXING EXPLOITS\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>9.1. Fixing Memory Corruption Exploits\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>9.1.1. Importing and Examining the Exploit.mp4 (7.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>9.1.1. Importing and Examining the Exploit.vtt (2.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>9.1.2. Cross-Compiling Exploit Code.mp4 (7.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>9.1.2. Cross-Compiling Exploit Code.vtt (2.2 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>9.1.3. Fixing the Exploit.mp4 (33.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>9.1.3. Fixing the Exploit.vtt (4.2 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>9.1.4. Changing the Overflow Buffer.mp4 (18.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>9.1.4. Changing the Overflow Buffer.vtt (3.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>9.2. Fixing Web Exploits\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>9.2.1. Selecting the Vulnerability and Fixing the Code.mp4 (14.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>9.2.1. Selecting the Vulnerability and Fixing the Code.vtt (3.4 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>9.2.2. Troubleshooting the 'index out of range' Error.mp4 (16.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>9.2.2. Troubleshooting the 'index out of range' Error.vtt (3.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>10. LOCATING PUBLIC EXPLOITS\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>10.1. Offline Exploit Resources\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>10.1.1. SearchSploit.mp4 (17.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>10.1.1. SearchSploit.vtt (3.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>10.1.2. Nmap NSE Scripts.mp4 (4.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>10.1.2. Nmap NSE Scripts.vtt (1.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>10.2. Exploiting a Target\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>10.2.1. Putting It Together.mp4 (34.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>10.2.1. Putting It Together.vtt (8.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>11. WINDOWS PRIVILEGE ESCALATION\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>11.1. Enumerating Windows\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.1.1. Situational Awareness.mp4 (65.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.1.1. Situational Awareness.vtt (18.1 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.1.2. Hidden in Plain View.mp4 (33.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.1.2. Hidden in Plain View.vtt (9.8 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.1.3. Information Goldmine PowerShell.mp4 (37.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.1.3. Information Goldmine PowerShell.vtt (12.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.1.4. Automated Enumeration.mp4 (24.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.1.4. Automated Enumeration.vtt (6.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>11.2. Leveraging Windows Services\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.2.1. Service Binary Hijacking.mp4 (65.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.2.1. Service Binary Hijacking.vtt (15.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.2.2. Service DLL Hijacking.mp4 (69.7 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.2.2. Service DLL Hijacking.vtt (15.1 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.2.3. Unquoted Service Paths.mp4 (48.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.2.3. Unquoted Service Paths.vtt (12.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>11.3. Abusing Other Windows Components\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.3.1. Scheduled Tasks.mp4 (21.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.3.1. Scheduled Tasks.vtt (4.4 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>11.3.2. Using Exploits.mp4 (22.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>11.3.2. Using Exploits.vtt (9.7 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>13. PORT REDIRECTION AND SSH TUNNELING\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>13.1. Port Forwarding with Linux Tools\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.1.1. A Simple Port Forwarding Scenario.mp4 (7.7 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.1.1. A Simple Port Forwarding Scenario.vtt (4.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.1.2. Setting Up the Lab Environment.mp4 (34.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.1.2. Setting Up the Lab Environment.vtt (8.1 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.1.3. Port Forwarding with Socat.mp4 (29.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.1.3. Port Forwarding with Socat.vtt (6.9 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>13.2. SSH Tunneling\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.2.1. SSH Local Port Forwarding.mp4 (46.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.2.1. SSH Local Port Forwarding.vtt (11.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.2.2. SSH Dynamic Port Forwarding.mp4 (26.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.2.2. SSH Dynamic Port Forwarding.vtt (8.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.2.3. SSH Remote Port Forwarding.mp4 (17.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.2.3. SSH Remote Port Forwarding.vtt (6.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.2.4. SSH Remote Dynamic Port Forwarding.mp4 (15.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.2.4. SSH Remote Dynamic Port Forwarding.vtt (6.0 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.2.5. Using sshuttle.mp4 (7.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.2.5. Using sshuttle.vtt (2.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>13.3. Port Forwarding with Windows Tools\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.3.1. ssh.exe.mp4 (12.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.3.1. ssh.exe.vtt (3.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.3.2. Plink.mp4 (19.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.3.2. Plink.vtt (6.6 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>13.3.3. Netsh.mp4 (24.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>13.3.3. Netsh.vtt (5.8 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>14. TUNNELING THROUGH DEEP PACKET INSPECTION\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>14.1. HTTP Tunneling Theory and Practice\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>14.1.1. HTTP Tunneling Fundamentals.mp4 (4.7 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>14.1.1. HTTP Tunneling Fundamentals.vtt (1.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>14.1.2. HTTP Tunneling with Chisel.mp4 (24.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>14.1.2. HTTP Tunneling with Chisel.vtt (8.7 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>14.2. DNS Tunneling Theory and Practice\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>14.2.1. DNS Tunneling Fundamentals.mp4 (44.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>14.2.1. DNS Tunneling Fundamentals.vtt (11.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>14.2.2. DNS Tunneling with dnscat2.mp4 (25.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>14.2.2. DNS Tunneling with dnscat2.vtt (5.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>15. THE METASPLOIT FRAMEWORK\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>15.1. Getting Familiar with Metasploit\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.1.1. Setup and Work with MSF.mp4 (17.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.1.1. Setup and Work with MSF.vtt (6.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.1.2. Auxiliary Modules.mp4 (28.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.1.2. Auxiliary Modules.vtt (7.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.1.3. Exploit Modules.mp4 (32.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.1.3. Exploit Modules.vtt (11.3 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>15.2. Using Metasploit Payloads\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.2.1. Staged vs Non-Staged Payloads.mp4 (10.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.2.1. Staged vs Non-Staged Payloads.vtt (3.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.2.2. Meterpreter Payload.mp4 (49.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.2.2. Meterpreter Payload.vtt (9.2 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.2.3. Executable Payloads.mp4 (24.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.2.3. Executable Payloads.vtt (6.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>15.3. Performing Post-Exploitation with Metasploit\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.3.1. Core Meterpreter Post-Exploitation Features.mp4 (39.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.3.1. Core Meterpreter Post-Exploitation Features.vtt (8.8 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.3.2. Post-Exploitation Modules.mp4 (33.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.3.2. Post-Exploitation Modules.vtt (5.8 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.3.3. Pivoting with Metasploit.mp4 (37.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.3.3. Pivoting with Metasploit.vtt (8.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>15.4. Automating Metasploit\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>15.4.1. Resource Scripts.mp4 (17.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>15.4.1. Resource Scripts.vtt (5.7 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>16.1. Active Directory - Manual Enumeration\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.1.1. Active Directory - Enumeration Using Legacy Windows Tools.mp4 (9.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.1.1. Active Directory - Enumeration Using Legacy Windows Tools.vtt (4.0 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.1.2. Enumerating Active Directory using PowerShell and .NET Classes.mp4 (20.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.1.2. Enumerating Active Directory using PowerShell and .NET Classes.vtt (6.0 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.1.3. Adding Search Functionality to our Script.mp4 (55.4 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.1.3. Adding Search Functionality to our Script.vtt (11.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.1.4. AD Enumeration with PowerView.mp4 (9.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.1.4. AD Enumeration with PowerView.vtt (4.7 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>16.2. Manual Enumeration - Expanding our Repertoire\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.2.1. Enumerating Operating Systems.mp4 (4.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.2.1. Enumerating Operating Systems.vtt (1.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.2.2. Getting an Overview - Permissions and Logged on Users.mp4 (34.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.2.2. Getting an Overview - Permissions and Logged on Users.vtt (16.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.2.3. Enumeration Through Service Principal Names.mp4 (6.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.2.3. Enumeration Through Service Principal Names.vtt (2.1 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.2.4. Enumerating Object Permissions.mp4 (19.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.2.4. Enumerating Object Permissions.vtt (7.6 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.2.5. Enumerating Domain Shares.mp4 (15.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.2.5. Enumerating Domain Shares.vtt (5.1 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>16.3. Active Directory - Automated Enumeration\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.3.1. Collecting Data with SharpHound.mp4 (8.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.3.1. Collecting Data with SharpHound.vtt (3.0 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>16.3.2. Analysing Data using BloodHound.mp4 (46.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>16.3.2. Analysing Data using BloodHound.vtt (13.6 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>17.1. Understanding Active Directory Authentication\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>17.1.1. Cached AD Credentials.mp4 (17.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>17.1.1. Cached AD Credentials.vtt (4.9 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>17.2. Performing Attacks on Active Directory Authentication\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>17.2.1. Password Attacks.mp4 (30.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>17.2.1. Password Attacks.vtt (10.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>17.2.2. AS-REP Roasting.mp4 (16.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>17.2.2. AS-REP Roasting.vtt (4.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>17.2.3. Kerberoasting.mp4 (24.9 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>17.2.3. Kerberoasting.vtt (4.1 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>17.2.4. Silver Tickets.mp4 (23.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>17.2.4. Silver Tickets.vtt (7.5 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>17.2.5. Domain Controller Synchronization.mp4 (14.3 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>17.2.5. Domain Controller Synchronization.vtt (3.7 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>18. LATERAL MOVEMENT IN ACTIVE DIRECTORY\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>18.1. Active Directory Lateral Movement Techniques\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>18.1.1. WMI and WinRM.mp4 (29.1 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>18.1.1. WMI and WinRM.vtt (7.7 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>18.1.2. PsExec.mp4 (4.5 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>18.1.2. PsExec.vtt (1.3 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>18.1.3. Pass the Hash.mp4 (3.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>18.1.3. Pass the Hash.vtt (1.0 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>18.1.4. Overpass the Hash.mp4 (22.0 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>18.1.4. Overpass the Hash.vtt (5.0 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>18.1.5. Pass the Ticket.mp4 (20.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>18.1.5. Pass the Ticket.vtt (3.8 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>18.1.6. DCOM.mp4 (10.2 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>18.1.6. DCOM.vtt (2.8 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>18.2. Active Directory Persistence\u003C/span>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>18.2.1. Golden Ticket.mp4 (17.6 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>18.2.1. Golden Ticket.vtt (4.9 KB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-movies\">\u003C/i>18.2.2. Shadow Copies.mp4 (9.8 MB)\u003C/li>\n\u003Cli>\u003Ci class=\"flaticon-other-file\">\u003C/i>18.2.2. Shadow Copies.vtt (2.7 KB)\u003C/li>\n\u003C/ul>\n\u003Cul>\n\u003Cli>\u003Ci class=\"flaticon-book\">\u003C/i>PEN200.pdf (37.9 MB)\u003C/li>\n\n              \u003C/ul>",2,"\u003Ch3>Code: \u003C/h3>\n                \u003Cul>\n                                    \u003Cli>\u003Cspan class=\"icon\">\u003Ci class=\"flaticon-href-link\">\u003C/i>\u003C/span> udp://tracker.leechers-paradise.org:6969/announce\u003C/li>\n                                  \u003C/ul>","1 month ago","2025-08-24 14:32:04","2025-09-23T09:49:40.000000Z","2025-09-24T18:56:52.000000Z","oscp-pen-200-penetration-testing-with-kali-linux-2023","Other","Tutorials","Aug. 24th '25",{"id":6,"name":26},{"id":7,"name":27,"icon":31},"flaticon-tutorial",[]]