https://img87.pixhost.to/images/599/359020115_tuto.jpg


CBT Nuggets - Penetration Testing Tools
Language: English | Size:6.46 GB
Genre:eLearning

Files Included :

1  Pentesting Reconnaissance.mp4 (25.5 MB)
MP4
10  Basic NMAP Commands.mp4 (28.15 MB)
MP4
100  Linux SUID and SUDO privilege escalation.mp4 (41.4 MB)
MP4
101  Linux Local Exploit Privilege Escalation.mp4 (80.35 MB)
MP4
102  Physical Pentest Documents.mp4 (38.32 MB)
MP4
103  Reconnaissance and Planning.mp4 (29.21 MB)
MP4
104  Physical Pentest Tools.mp4 (53.19 MB)
MP4
105  Getting Inside.mp4 (33.55 MB)
MP4
106  Continuing From the Inside.mp4 (31.17 MB)
MP4
107  Physical Pentest Report.mp4 (28.05 MB)
MP4
108  Credential Attacks Pt 1.mp4 (38.03 MB)
MP4
109Credential Attacks Pt 2.mp4 (42.88 MB)
MP4
11  Ping Scans with NMAP.mp4 (22.39 MB)
MP4
110  Creating Custom Wordlists.mp4 (61.02 MB)
MP4
111  Performing a Brute Force Attack.mp4 (50.49 MB)
MP4
112  Cracking Hashed Passwords.mp4 (73.04 MB)
MP4
113  Executing a Pass the Hash Attack.mp4 (27.85 MB)
MP4
114  Credential Harvesting and PrivEsc in the Cloud.mp4 (55.68 MB)
MP4
115  Running PACU.mp4 (55.83 MB)
MP4
116  Misconfigured Cloud Assets.mp4 (39.84 MB)
MP4
117  Running CloudSploit.mp4 (59.57 MB)
MP4
118  Resource Exhaustion, Malware Injection and API Attacks.mp4 (29.37 MB)
MP4
119  Side Channel and Direct-To-Origin Attacks.mp4 (32.23 MB)
MP4
12  Scanning TCP and UDP with NMAP.mp4 (32.43 MB)
MP4
120  Additional Cloud Pentesting Tools.mp4 (20.81 MB)
MP4
121  Mobile Device Attacks.mp4 (20.24 MB)
MP4
122  Mobile Device Vulnerabilities.mp4 (46.57 MB)
MP4
123  Mobile Security Tools.mp4 (26.63 MB)
MP4
124  Internet of Things (IoT) Devices.mp4 (39.67 MB)
MP4
125  Data Storage System Vulnerabilities.mp4 (34.86 MB)
MP4
126  SCADA, IIoT and ICS Vulnerabilities.mp4 (28.14 MB)
MP4
127  Virtual Environment Vulnerabilities.mp4 (28.36 MB)
MP4
128  Establishing Persistence.mp4 (23.17 MB)
MP4
129  Lateral Movement.mp4 (41.89 MB)
MP4
13  Identifying Host Attributes with NMAP.mp4 (38.24 MB)
MP4
130  Data Exfiltration.mp4 (30.77 MB)
MP4
131  Covering Your Tracks.mp4 (30.1 MB)
MP4
132  Linux Post Exploit Activities.mp4 (63.92 MB)
MP4
133  Windows Post Exploit Activities.mp4 (72.93 MB)
MP4
134  Analyze a Basic Script.mp4 (81.59 MB)
MP4
135  Scripting Basics.mp4 (123.19 MB)
MP4
136  Assigning Values to Variables.mp4 (87.12 MB)
MP4
137  Operating on Variables with Operators.mp4 (77.36 MB)
MP4
138  Branching Code with Conditionals.mp4 (83.93 MB)
MP4
139  Reapeating Code with Loops.mp4 (91.3 MB)
MP4
14  Using NMAP Scripts.mp4 (33.77 MB)
MP4
140  Handling Errors in Code.mp4 (88.65 MB)
MP4
141  Intro.mp4 (16.59 MB)
MP4
142  Analyzing PING Scripts.mp4 (58.03 MB)
MP4
143  Downloading Files with Scripts.mp4 (23.37 MB)
MP4
144  Automation with Scripts.mp4 (85.48 MB)
MP4
145  Updating IP Settings with a Script.mp4 (37.46 MB)
MP4
146  NMAP Reports in HTML.mp4 (49.24 MB)
MP4
15  Bypassing Firewalls with NMAP.mp4 (34.11 MB)
MP4
16  Intro to Enumerating Services and Vulnerabilities.mp4 (14.16 MB)
MP4
17  Enumerating with Port Scanners.mp4 (96.16 MB)
MP4
18  Enumerating Web Servers.mp4 (113.66 MB)
MP4
19  Enumerating SMB and Shares.mp4 (61.81 MB)
MP4
2  Pentesting Reconnaissance Tools.mp4 (41.13 MB)
MP4
20  Enumerating Vulnerabilities with Nessus.mp4 (89.18 MB)
MP4
21  Automating Enumeration.mp4 (52.23 MB)
MP4
22  Pentest Enumeration Review.mp4 (18.6 MB)
MP4
23  Social Engineering Anatomy.mp4 (57.09 MB)
MP4
24  Social Engineering Attacks.mp4 (40.3 MB)
MP4
25  Social Engineering Tools.mp4 (40.33 MB)
MP4
26  Social Engineering Toolkit.mp4 (97.54 MB)
MP4
27  Using WifiPhisher.mp4 (17.21 MB)
MP4
28  Pharming With ShellPhish.mp4 (36.56 MB)
MP4
29  Social Engineering Review.mp4 (20.75 MB)
MP4
3  Domain Information Tools.mp4 (72.45 MB)
MP4
30  Exploits and Payloads.mp4 (40.28 MB)
MP4
31  Moving Files With PwnDrop.mp4 (69.6 MB)
MP4
32  Transferring Files with SMB and SCP.mp4 (49.21 MB)
MP4
33  Working With Exploits.mp4 (103.67 MB)
MP4
34  Working With Payloads.mp4 (46.84 MB)
MP4
35  Exploits and Payloads Review.mp4 (8.91 MB)
MP4
36  Intro to the Metasploit Framework.mp4 (23.83 MB)
MP4
37  Metasploit Startup and Workspaces.mp4 (40.38 MB)
MP4
38  Metasploit Modules.mp4 (68.38 MB)
MP4
39  Metasploit Options and Payloads.mp4 (83.33 MB)
MP4
4  IP and DNS Information Tools.mp4 (51.77 MB)
MP4
40  Managing Metasploit Sessions.mp4 (22.68 MB)
MP4
41  Using Meterpreter.mp4 (68.46 MB)
MP4
42  Metasploit Framework Review.mp4 (10.41 MB)
MP4
43  Network Based Attacks and Tools.mp4 (53.3 MB)
MP4
44  How Attacks Against ARP Work.mp4 (31.76 MB)
MP4
45  ARP Poisoning Attack.mp4 (43.24 MB)
MP4
46  How DNS Cache Poisoning Works.mp4 (23.34 MB)
MP4
47  DNS Cache Poisoning Attack.mp4 (29.73 MB)
MP4
48  VLAN Hopping Attacks.mp4 (22.17 MB)
MP4
49  Bypassing Network Access Control.mp4 (20.5 MB)
MP4
5  Combination OSINT Tools.mp4 (72.33 MB)
MP4
50  Network Based Attacks Review.mp4 (33.19 MB)
MP4
51  Host Protocol Attacks and Tools Overview.mp4 (25.23 MB)
MP4
52  Server Message Block (SMB) Protocol.mp4 (25.12 MB)
MP4
53  Attacking the SMB Protocol.mp4 (70.66 MB)
MP4
54  Simple Network Management Protocol (SNMP).mp4 (34.5 MB)
MP4
55  Exploiting the SNMP Protocol.mp4 (83.13 MB)
MP4
56  Denial of Service Attacks.mp4 (32.51 MB)
MP4
57  Analyzing the LLMNR Protocol.mp4 (25.72 MB)
MP4
58  Attacking the LLMNR Protocol.mp4 (35.01 MB)
MP4
59  Host Protocol Attacks and Tools Review.mp4 (18.62 MB)
MP4
6  Breach Data Tools.mp4 (24.75 MB)
MP4
60  Wireless and Mobile Device Attacks and Tools.mp4 (42.26 MB)
MP4
61  Sniffing Wireless Data.mp4 (39.96 MB)
MP4
62  Wireless Analysis With Kismet.mp4 (42.73 MB)
MP4
63  Wireless Deauthentication Attacks.mp4 (24.49 MB)
MP4
64  Cracking WPA2 Preshared Keys.mp4 (31.99 MB)
MP4
65  Wireless Evil Twin Attack.mp4 (55.69 MB)
MP4
66  Automated Wifi Attack Tools.mp4 (34.22 MB)
MP4
67  Section Review.mp4 (21.55 MB)
MP4
68  OWASP Top 10 (1 thru 3).mp4 (56.69 MB)
MP4
69  OWASP Top 10 (4 thru 6).mp4 (36.73 MB)
MP4
7  Pentesting Reconnaissance Review.mp4 (16.61 MB)
MP4
70  OWASP Top 10 (7 thru 10).mp4 (44.92 MB)
MP4
71  Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF).mp4 (29.4 MB)
MP4
72  SQL Injection Attacks.mp4 (26 MB)
MP4
73  File Inclusion Vulnerabilities.mp4 (38.74 MB)
MP4
74  Additional Web App Vulnerabilities and Attacks.mp4 (30.27 MB)
MP4
75  Web Application Pentesting.mp4 (20.75 MB)
MP4
76  OWASP ZAP.mp4 (72.53 MB)
MP4
77  Attack Scans Using OWASP ZAP.mp4 (42.23 MB)
MP4
78  Brute Force Attack Using OWASP ZAP.mp4 (52.2 MB)
MP4
79  SQL Injection Using SQLmap.mp4 (72.33 MB)
MP4
8  Intro to Pentesting Enumeration.mp4 (44.64 MB)
MP4
80  Local and Remote File Inclusion Attacks.mp4 (48.73 MB)
MP4
81  Cross Site Scripting (XSS) Attacks.mp4 (30.67 MB)
MP4
82  Bind and Reverse Shells.mp4 (36.35 MB)
MP4
83  The Power of Web Shells.mp4 (56.79 MB)
MP4
84  Working With Bind and Reverse Shells.mp4 (28.62 MB)
MP4
85  Shell One-Liners.mp4 (24.13 MB)
MP4
86  Spawning Meterpreter Shells.mp4 (57.35 MB)
MP4
87  Log Poisoning for a Shell.mp4 (58.11 MB)
MP4
88  Windows Privilege Escalation Pt 1.mp4 (36.01 MB)
MP4
89  Windows Privilege Escalation Pt 2.mp4 (28.9 MB)
MP4
9  Pentest Enumeration Tools.mp4 (52.15 MB)
MP4
90  Getting a Windows Shell.mp4 (58.04 MB)
MP4
91  Windows Local Host Enumeration.mp4 (49.66 MB)
MP4
92  Windows Unquoted Service Path Vulnerability.mp4 (46.29 MB)
MP4
93  Windows Local Exploit Privilege Escalation.mp4 (86.63 MB)
MP4
94  Introduction to Privilege Escalation.mp4 (46.33 MB)
MP4
95  Linux Privilege Escalation Pt 1.mp4 (29.92 MB)
MP4
96  Linux Privilege Escalation Pt 2.mp4 (33.19 MB)
MP4
97  Linux Shell Escalation.mp4 (30.62 MB)
MP4
98  Linux Local Host Enumeration.mp4 (61.53 MB)
MP4
99  Linux Privilege Escalation Via Cron Jobs.mp4 (45.48 MB)
MP4

https://thumbs2.imgbox.com/23/3f/u2RPMitk_t.jpg

https://img87.pixhost.to/images/1010/363506399_rg.png
CBT Nuggets - Penetration Testing Tools.z01

Код:
https://rapidgator.net/file/de154dab386440636de5fbe97353059c/CBT_Nuggets_-_Penetration_Testing_Tools.z01

CBT Nuggets - Penetration Testing Tools.z02

Код:
https://rapidgator.net/file/3bd5fe0402d024ec2c89db75f20fd96d/CBT_Nuggets_-_Penetration_Testing_Tools.z02

CBT Nuggets - Penetration Testing Tools.z03

Код:
https://rapidgator.net/file/2150583ed168f42b4aa6ceb87ebe9644/CBT_Nuggets_-_Penetration_Testing_Tools.z03

CBT Nuggets - Penetration Testing Tools.z04

Код:
https://rapidgator.net/file/360fea7eb3577d0e8e1e260d4d9c46b4/CBT_Nuggets_-_Penetration_Testing_Tools.z04

CBT Nuggets - Penetration Testing Tools.z05

Код:
https://rapidgator.net/file/a3c20c2c4ff1917fcfe13e296565692a/CBT_Nuggets_-_Penetration_Testing_Tools.z05

CBT Nuggets - Penetration Testing Tools.z06

Код:
https://rapidgator.net/file/6215ab17a31c4b9fe0f30ddb26ac9196/CBT_Nuggets_-_Penetration_Testing_Tools.z06

CBT Nuggets - Penetration Testing Tools.zip

Код:
https://rapidgator.net/file/763940ca2d6d7580447daf14bc41992f/CBT_Nuggets_-_Penetration_Testing_Tools.zip

https://img87.pixhost.to/images/1103/364146951_nitroflare.jpg
CBT Nuggets - Penetration Testing Tools.z01

Код:
https://nitroflare.com/view/8FE7903640EA280/CBT_Nuggets_-_Penetration_Testing_Tools.z01

CBT Nuggets - Penetration Testing Tools.z02

Код:
https://nitroflare.com/view/BB5B338DE083C4F/CBT_Nuggets_-_Penetration_Testing_Tools.z02

CBT Nuggets - Penetration Testing Tools.z03

Код:
https://nitroflare.com/view/4B38876ED6D124C/CBT_Nuggets_-_Penetration_Testing_Tools.z03

CBT Nuggets - Penetration Testing Tools.z04

Код:
https://nitroflare.com/view/F4504C5E83935E0/CBT_Nuggets_-_Penetration_Testing_Tools.z04

CBT Nuggets - Penetration Testing Tools.z05

Код:
https://nitroflare.com/view/31F2BEEBAA5E5D2/CBT_Nuggets_-_Penetration_Testing_Tools.z05

CBT Nuggets - Penetration Testing Tools.z06

Код:
https://nitroflare.com/view/436C6925801AB61/CBT_Nuggets_-_Penetration_Testing_Tools.z06

CBT Nuggets - Penetration Testing Tools.zip

Код:
https://nitroflare.com/view/2EA2197EF6370A2/CBT_Nuggets_-_Penetration_Testing_Tools.zip