Lesson 5 Authentication and Session Management Vulnerabilities/002. 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities.mp4 733.0 MB
Lesson 3 Build Your Own Web Application Lab/002. 3.1 Exploring Kali Linux.mp4 586.2 MB
Lesson 4 Reconnaissance and Profiling Web Applications/009. 4.8 Introducing the Burp Suite.mp4 549.6 MB
Lesson 4 Reconnaissance and Profiling Web Applications/004. 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester.mp4 511.9 MB
Lesson 5 Authentication and Session Management Vulnerabilities/003. 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities.mp4 460.4 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/003. 1.2 Understanding Enterprise Wide Penetration Testing.mp4 455.8 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/007. 1.6 Building Your Own Lab Overview.mp4 454.8 MB
Lesson 11 Powershell Attacks/003. 11.2 Pwning Windows Using PowerShell Empire Components, Setup, and Basic Exploits.mp4 423.5 MB
Lesson 6 Hacking User Credentials/006. 6.5 Cracking Passwords with John the Ripper.mp4 421.4 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/004. 14.3 Gaining Network Access with SMB Relay Attacks, NetBIOS Name Service and LLMNR Poisoning.mp4 404.4 MB
Lesson 8 Hacking Networking Devices/012. 8.11 Understanding Firewall Fundamentals and Levels of Inspection.mp4 330.6 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/002. 1.1 Introducing Red Teams and Enterprise Hacking.mp4 329.8 MB
Lesson 2 External and Internal Reconnaissance/002. 2.1 Understanding the Red Team Environment.mp4 328.6 MB
Lesson 9 Fundamentals of Wireless Hacking/005. 9.4 Hacking WEP, WPA, and Other Protocols.mp4 326.5 MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/003. 11.2 Exploiting Insecure Direct Object References and Path Traversal.mp4 323.5 MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/005. 11.4 Fuzzing Web Applications.mp4 311.8 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/003. 14.2 Gaining Network Access.mp4 308.4 MB
Lesson 2 Wireless Client Attacks/002. 2.1 Understanding Wireless Client Attacks and Their Motives.mp4 305.9 MB
Lesson 8 Exploiting Weak Cryptographic Implementations/003. 8.2 Identifying Common Flaws in Data Storage and Transmission.mp4 303.2 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/006. 1.5 Surveying Operational Processes and Policies for the Red Team.mp4 222.5 MB
Lesson 9 Cloud Services/002. 9.1 Understanding the Challenge of Testing Cloud Services.mp4 220.9 MB
Lesson 10 Client-side Attacks/002. 10.1 Surveying the Client-side Code and Storage.mp4 196.5 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/005. 1.4 Exploring How to Plan and Fund a Red Team.mp4 195.1 MB
Lesson 7 Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities/008. 7.7 Evading Web Application Security Controls.mp4 193.9 MB
Lesson 8 Hacking Networking Devices/002. 8.1 Understanding the Reasons for and the Steps to Hacking a Network.mp4 193.8 MB
Lesson 2 Overview of Web Applications for Security Professionals/008. 2.7 Surveying Docker Containers.mp4 190.8 MB
Lesson 9 Cloud Services/003. 9.2 Exploring How to Test in the Cloud.mp4 190.4 MB
Lesson 3 Passive Reconnaissance/006. 3.5 Surveying Essential Tools for Passive Reconnaissance SpiderFoot, theHarvester, and Discover.mp4 187.3 MB
Lesson 13 Social Engineering/003. 13.2 Exploring the Social Engineering Toolkit (SET).mp4 187.0 MB
Lesson 5 Hacking Web Applications/004. 5.3 Uncovering Web Vulnerabilities.mp4 186.1 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/006. 1.5 Exploring Penetration Testing and other Cyber Security Certifications.mp4 180.3 MB
Lesson 5 Web App Testing/003. 5.2 Exploring Web App Testing Essential Tools.mp4 179.8 MB
Lesson 4 Aircrack-ng/002. 4.1 Introducing the Aircrack-ng Suite.mp4 178.8 MB
Lesson 4 Reconnaissance and Profiling Web Applications/010. 4.9 Introducing OWASP Zed Application Proxy (ZAP).mp4 178.4 MB
Lesson 2 Overview of Web Applications for Security Professionals/003. 2.2 Exploring the HTTP Request and Response.mp4 175.2 MB
Lesson 1 Introduction to Web Application Penetration Testing/006. 1.5 Exploring What Programming Languages You Should Know.mp4 174.9 MB
Hacking Web Applications (The Art of Hacking Series) Security Penetration Testing for Today's DevOps and Cloud Environments by Omar Santos/001. Introduction.mp4 174.4 MB
Lesson 5 Hacking Web Applications/002. 5.1 Understanding Web Applications.mp4 173.9 MB
Lesson 3 Building Your Lab and Attack Hardware/004. 3.3 Building Your Own Lab.mp4 173.2 MB
Summary/001. Hacking Web Applications Summary.mp4 172.8 MB
Lesson 6 Hacking WPA/004. 6.3 Using coWPAtty.mp4 172.6 MB
Lesson 14 Maintaining Persistence, Pivoting, and Data Exfiltration/002. 14.1 Understanding Persistence.mp4 172.2 MB
Lesson 6 Hacking User Credentials/002. 6.1 Understanding Authentication and Authorization Mechanisms.mp4 169.8 MB
Lesson 4 Reconnaissance and Profiling Web Applications/003. 4.2 Using Search Engines and Public Information.mp4 169.6 MB
Lesson 13 Mobile Device Security/002. 13.1 Understanding OWASP Mobile Device Vulnerabilities.mp4 168.1 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/004. 1.3 Understanding the Difference Between Red and Blue Teams.mp4 167.3 MB
Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/007. 8.6 Searching for Sensitive Data.mp4 148.5 MB
Lesson 9 Attacking Application Programming Interfaces (APIs)/003. 9.2 Exploring the Tools Used to Test the APIs.mp4 145.5 MB
Lesson 2 Kali Linux/002. 2.1 Installing Kali.mp4 145.0 MB
Lesson 4 Active Reconnaissance/005. 4.4 Surveying Essential Tools for Active Reconnaissance Network and Web Vulnerability Scanners.mp4 144.5 MB
Lesson 9 Attacking Bluetooth/003. 9.2 Surveying Tools for Bluetooth Monitoring.mp4 143.8 MB
Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/007. 1.6 Understanding How to Create and Hire the Red Team.mp4 143.3 MB
Lesson 8 Exploiting Weak Cryptographic Implementations/004. 8.3 Surveying Examples of Crypto-based Attacks and Vulnerabilities.mp4 143.1 MB
Lesson 5 Cracking WEP/003. 5.2 Learning How to Crack WEP.mp4 142.3 MB
Lesson 2 Kali Linux/003. 2.2 Examining Kali Modules and Architecture.mp4 141.2 MB
Lesson 4 Reconnaissance and Profiling Web Applications/005. 4.4 Exploring CMS and Framework Identification.mp4 140.9 MB
Lesson 1 Overview of Ethical Hacking and Penetration Testing/004. 1.3 Understanding the Legal Aspects of Penetration Testing.mp4 140.4 MB
Lesson 8 Hacking Networking Devices/005. 8.4 Building an Internetwork Topology Using VIRL.mp4 140.1 MB
Lesson 4 Active Reconnaissance/002. 4.1 Understanding Active Reconnaissance.mp4 140.0 MB
Lesson 1 Introduction to Web Application Penetration Testing/003. 1.2 Surveying Web Application Penetration Testing Methodologies.mp4 140.0 MB
Lesson 2 Kali Linux/004. 2.3 Managing Kali Services.mp4 138.9 MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/002. 11.1 Understanding the Other Common Security Flaws in Web Applications.mp4 138.7 MB
Lesson 4 Reconnaissance and Profiling Web Applications/002. 4.1 Understanding Passive vs. Active Reconnaissance.mp4 137.3 MB