Info Hash:67D061975FB7778228F54E9BADECD513C9F30555
收录时间2026-01-23 07:11:07
更新时间2026-01-23 07:11:07
文件列表 (631)
Enterprise Penetration Testing and Continuous Monitoring (The Art of Hacking Series) by Omar Santos/001. Introduction.mp4
124.33 MB
.pad/3847166
3.67 MB
Hacking Web Applications (The Art of Hacking Series) Security Penetration Testing for Today's DevOps and Cloud Environments by Omar Santos/001. Introduction.mp4
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/001. Learning objectives.mp4
67.43 MB
.pad/29954836
28.57 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/002. 1.1 Introducing Red Teams and Enterprise Hacking.mp4
314.52 MB
.pad/5748387
5.48 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/003. 1.2 Understanding Enterprise Wide Penetration Testing.mp4
434.72 MB
.pad/13924110
13.28 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/004. 1.3 Understanding the Difference Between Red and Blue Teams.mp4
159.53 MB
.pad/493961
482.38 KB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/005. 1.4 Exploring How to Plan and Fund a Red Team.mp4
186.02 MB
.pad/6267420
5.98 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/006. 1.5 Surveying Operational Processes and Policies for the Red Team.mp4
212.22 MB
.pad/12355603
11.78 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/007. 1.6 Understanding How to Create and Hire the Red Team.mp4
136.64 MB
.pad/24492981
23.36 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/008. 1.7 Understanding Red Team Collaboration.mp4
150.8 MB
.pad/9650545
9.2 MB
Lesson 1 Introduction to Web Application Penetration Testing/001. Learning objectives.mp4
83.08 MB
.pad/13545456
12.92 MB
Lesson 1 Introduction to Web Application Penetration Testing/002. 1.1 Understanding Ethical Hacking and Penetration Testing.mp4
44.08 MB
.pad/20891693
19.92 MB
Lesson 1 Introduction to Web Application Penetration Testing/003. 1.2 Surveying Web Application Penetration Testing Methodologies.mp4
133.49 MB
.pad/27795942
26.51 MB
Lesson 1 Introduction to Web Application Penetration Testing/004. 1.3 Understanding the Need for Web Application Penetration Testing.mp4
75.18 MB
.pad/21834811
20.82 MB
Lesson 1 Introduction to Web Application Penetration Testing/005. 1.4 Exploring How Web Applications Have Evolved Over Time.mp4
122.85 MB
.pad/5396761
5.15 MB
Lesson 1 Introduction to Web Application Penetration Testing/006. 1.5 Exploring What Programming Languages You Should Know.mp4
166.8 MB
.pad/26424937
25.2 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/001. Learning objectives.mp4
58.17 MB
.pad/6111698
5.83 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/002. 1.1 Introducing Ethical Hacking and Pen Testing.mp4
215.53 MB
.pad/8884367
8.47 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/003. 1.2 Getting Started with Ethical Hacking and Pen Testing.mp4
352.96 MB
.pad/32544896
31.04 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/004. 1.3 Understanding the Legal Aspects of Penetration Testing.mp4
133.92 MB
.pad/27351598
26.08 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/005. 1.4 Exploring Penetration Testing Methodologies.mp4
88.26 MB
.pad/8117549
7.74 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/006. 1.5 Exploring Penetration Testing and other Cyber Security Certifications.mp4
171.99 MB
.pad/20979616
20.01 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/007. 1.6 Building Your Own Lab Overview.mp4
433.71 MB
.pad/14981649
14.29 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/008. 1.7 Building Your Own Lab VIRL and Operating System Software.mp4
264.1 MB
.pad/25060019
23.9 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/009. 1.8 Understanding Vulnerabilities, Threats, and Exploits.mp4
73.03 MB
.pad/24084981
22.97 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/010. 1.9 Understanding the Current Threat Landscape.mp4
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/001. Learning objectives.mp4
62.73 MB
.pad/1333982
1.27 MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/002. 11.1 Understanding the Other Common Security Flaws in Web Applications.mp4
132.27 MB
.pad/29073866
27.73 MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/003. 11.2 Exploiting Insecure Direct Object References and Path Traversal.mp4
308.55 MB
.pad/12008834
11.45 MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/004. 11.3 Surveying Information Disclosure Vulnerabilities.mp4
51.89 MB
.pad/12697056
12.11 MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/005. 11.4 Fuzzing Web Applications.mp4
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/001. Learning objectives.mp4
30.54 MB
.pad/1527961
1.46 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/002. 14.1 Understanding Persistence.mp4
164.19 MB
.pad/29161407
27.81 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/003. 14.2 Gaining Network Access.mp4
294.13 MB
.pad/27123195
25.87 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/004. 14.3 Gaining Network Access with SMB Relay Attacks, NetBIOS Name Service and LLMNR Poisoning.mp4
385.65 MB
.pad/31822017
30.35 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/005. 14.4 Maintaining Persistence.mp4
27.83 MB
.pad/4375493
4.17 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/006. 14.5 Understanding Pivoting and Lateral Movement.mp4
215.09 MB
.pad/9346264
8.91 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/007. 14.6 Defending Against the Advanced Persistent Threat.mp4
Lesson 4 Network and Vulnerability Scanning/001. Learning objectives.mp4
40.37 MB
.pad/24777367
23.63 MB
Lesson 4 Network and Vulnerability Scanning/002. 4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4
69.14 MB
.pad/28162167
26.86 MB
Lesson 4 Network and Vulnerability Scanning/003. 4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4
80.06 MB
.pad/16710667
15.94 MB
Lesson 4 Network and Vulnerability Scanning/004. 4.3 Understanding Scanning Tools.mp4
45.51 MB
.pad/19393109
18.49 MB
Lesson 4 Network and Vulnerability Scanning/005. 4.4 Exploring How to Automate Scans.mp4
205.28 MB
.pad/19629740
18.72 MB
Lesson 4 Network and Vulnerability Scanning/006. 4.5 Using Shodan and Its API.mp4
106.17 MB
.pad/22894347
21.83 MB
Lesson 4 Network and Vulnerability Scanning/007. 4.6 Exploring Vulnerability Scanners.mp4
149.19 MB
.pad/11331824
10.81 MB
Lesson 4 Network and Vulnerability Scanning/008. 4.7 Understanding Binary and Source Code Scanners.mp4
46.07 MB
.pad/18805650
17.93 MB
Lesson 4 Network and Vulnerability Scanning/009. 4.8 Understanding How to Perform Continuous Monitoring.mp4
39.4 MB
.pad/25799982
24.6 MB
Lesson 4 Reconnaissance and Profiling Web Applications/001. Learning objectives.mp4
103.73 MB
.pad/25451010
24.27 MB
Lesson 4 Reconnaissance and Profiling Web Applications/002. 4.1 Understanding Passive vs. Active Reconnaissance.mp4
130.94 MB
.pad/30471790
29.06 MB
Lesson 4 Reconnaissance and Profiling Web Applications/003. 4.2 Using Search Engines and Public Information.mp4
161.77 MB
.pad/31701677
30.23 MB
Lesson 4 Reconnaissance and Profiling Web Applications/004. 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester.mp4
488.22 MB
.pad/24938068
23.78 MB
Lesson 4 Reconnaissance and Profiling Web Applications/005. 4.4 Exploring CMS and Framework Identification.mp4
134.34 MB
.pad/26903406
25.66 MB
Lesson 4 Reconnaissance and Profiling Web Applications/006. 4.5 Surveying Web Crawlers and Directory Brute Force.mp4
151.67 MB
.pad/8731244
8.33 MB
Lesson 4 Reconnaissance and Profiling Web Applications/007. 4.6 Understanding How Web Application Scanners Work.mp4
63.98 MB
.pad/18934
18.49 KB
Lesson 4 Reconnaissance and Profiling Web Applications/008. 4.7 Introducing Nikto.mp4
116.54 MB
.pad/12016592
11.46 MB
Lesson 4 Reconnaissance and Profiling Web Applications/009. 4.8 Introducing the Burp Suite.mp4
524.18 MB
.pad/20781928
19.82 MB
Lesson 4 Reconnaissance and Profiling Web Applications/010. 4.9 Introducing OWASP Zed Application Proxy (ZAP).mp4
170.13 MB
.pad/22928875
21.87 MB
Lesson 4 Reconnaissance and Profiling Web Applications/011. 4.10 Introducing OpenVAS.mp4
266.46 MB
.pad/22587199
21.54 MB
Lesson 5 Authentication and Session Management Vulnerabilities/001. Learning objectives.mp4
52.21 MB
.pad/12361978
11.79 MB
Lesson 5 Authentication and Session Management Vulnerabilities/002. 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities.mp4
699.02 MB
.pad/5224398
4.98 MB
Lesson 5 Authentication and Session Management Vulnerabilities/003. 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities.mp4