7.18 GB | 14min 11s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
001 Download and Install VirtualBOX.mp4 (22.91 MB)
002 Download and Install Kali Linux -VirtualBox.mp4 (40.66 MB)
003 Download and Install Kali Linux Image File.mp4 (22.67 MB)
004 Download and add Metasploitable Image File.mp4 (11.91 MB)
005 Windows 7 Add VirtualBox.mp4 (8.51 MB)
006 BeeBox Download and Add VirtualBox.mp4 (14.24 MB)
007 Create Nat Network and Connections Test with VirtualBox.mp4 (60.14 MB)
001 VmWare Download and Install.mp4 (9.6 MB)
002 Kali Linux Install VMWare.mp4 (24.03 MB)
003 Kali Image File Add VmWare.mp4 (24.67 MB)
004 Metasploitable Add VmWare.mp4 (18.58 MB)
005 Owasp Add VmWare.mp4 (18.4 MB)
006 Win7 add VmWare.mp4 (16.64 MB)
007 BeeBox Download and Add VmWare.mp4 (5.89 MB)
008 Create Nat Network and Connections Test with VmWare.mp4 (29.21 MB)
001 Content of the Penetration Testing.mp4 (9.42 MB)
002 Definition of Penetration Test.mp4 (15.43 MB)
003 Penetration Test Types.mp4 (1.07 MB)
004 Security Audits.mp4 (11.27 MB)
005 Vulnerability Scan.mp4 (6.02 MB)
006 Terms Asset, Threat, Vulnerability, Risk, Exploit.mp4 (11.21 MB)
007 Penetration Test Approaches.mp4 (7.9 MB)
008 Planning a Penetration Test.mp4 (13.15 MB)
009 Penetration Test Phases.mp4 (36.49 MB)
010 Legal Issues & Testing Standards.mp4 (16.43 MB)
001 What is "Protocol".mp4 (39.44 MB)
002 Reference Models.mp4 (1.14 MB)
003 OSI Reference Model.mp4 (48.87 MB)
004 OSI vs TCPIP.mp4 (7.03 MB)
005 Demonstration using Wireshark.mp4 (59.91 MB)
006 Standards & Protocols.mp4 (27.19 MB)
007 Ethernet Principles, Frame & Headers.mp4 (14.46 MB)
008 ARP ( Address Resolution Protocol ) Mechanism, ARP Tables, ARP Packets.mp4 (74.58 MB)
009 ARP Hand-On Practices.mp4 (12.61 MB)
010 VLANs - Virtual Local Area Networks.mp4 (15.69 MB)
011 WLANs - Wireless Local Area Networks.mp4 (17.24 MB)
012 Introduction to Network Layer.mp4 (4.07 MB)
013 Internet Protocol - IP.mp4 (6.75 MB)
014 IPv4 Adressing System.mp4 (5.21 MB)
015 IPv4 Packet Header.mp4 (6.94 MB)
016 IPv4 Subnetting Classful Networks.mp4 (6.07 MB)
017 IPv4 Subnetting Subnet Mask.mp4 (8.22 MB)
018 IPv4 Subnetting Understanding.mp4 (9.75 MB)
019 IPv4 Shortage.mp4 (3.47 MB)
020 Private Networks.mp4 (13.71 MB)
021 Private Networks - Demonstration.mp4 (5.96 MB)
022 NAT - Network Address Translation.mp4 (8.85 MB)
023 IPv6, Packet Header & Addressing.mp4 (26.06 MB)
024 DHCP - How the Mechanism Works.mp4 (32.43 MB)
025 ICMP - Internet Control Message Protocol.mp4 (5.49 MB)
026 Traceroute.mp4 (68.27 MB)
027 Introduction to Transport Layer.mp4 (5.45 MB)
028 TCP - Transmission Control Protocol.mp4 (16.85 MB)
029 TCP Header.mp4 (5.47 MB)
030 UDP - User Datagram Protocol.mp4 (10.3 MB)
031 Introduction to Application Layer.mp4 (2.45 MB)
032 DNS - Domain Name System.mp4 (14.1 MB)
033 HTTP ( Hyper Text Transfer Protocol ).mp4 (7.78 MB)
034 HTTPS.mp4 (4.48 MB)
001 What is Linux.mp4 (8.57 MB)
002 Distributions.mp4 (2.42 MB)
003 Pieces of Linux.mp4 (5.92 MB)
004 Shell.mp4 (14.12 MB)
005 Linux Signs $ # ~ encrypted.mp4 (1.71 MB)
006 Linux Desktop Environments.mp4 (4.37 MB)
007 Linux File Hierarchy.mp4 (8.08 MB)
001 Command Parameters.mp4 (7.15 MB)
002 List Files - ls Command.mp4 (22.07 MB)
003 Print Working Directory - pwd Command.mp4 (2.36 MB)
004 Show Manuel - man Command.mp4 (16.36 MB)
005 Change Directory - cd Command.mp4 (5.63 MB)
006 Concatenate Files - cat Command.mp4 (6.51 MB)
007 Display Output - echo Command.mp4 (8.06 MB)
008 View the File with more Command.mp4 (18.83 MB)
009 View the File with less Command.mp4 (6.62 MB)
010 Print First Lines with head Command.mp4 (4.48 MB)
011 Print Last Lines with tail Command.mp4 (4.37 MB)
012 Global Regular Expression Print - grep Command.mp4 (16.91 MB)
013 Unix Name - uname Command.mp4 (2.91 MB)
014 Output Redirection.mp4 (9.97 MB)
015 Output Redirection Pipe "".mp4 (10.76 MB)
001 Make Directory - mkdir Command.mp4 (4.98 MB)
002 Create File & Modify Date - touch Command.mp4 (5.2 MB)
003 Remove Files or Directories - rm Command.mp4 (7.25 MB)
004 Copy and Move Files or Directories - cp & mv Command.mp4 (9.61 MB)
005 Find Files and Directories - find Command.mp4 (9.19 MB)
006 Cut Parts of Lines - cut Command.mp4 (11.13 MB)
007 Change Ownership of a Given File - chown Command.mp4 (4.03 MB)
001 Intro to Reconnaissance.mp4 (8.87 MB)
002 Extract Domain Registration Information Whois.mp4 (15.92 MB)
003 Identifying Hosts or Subdomains Using DNS Fierce & Theharvester.mp4 (13.35 MB)
004 Detect Applications on The Same Service.mp4 (3.43 MB)
005 Ports and Services on The Web Server.mp4 (33.04 MB)
006 Review TechnologyArchitecture Information.mp4 (23.36 MB)
007 Extracting Directory Structure Crawling.mp4 (26.41 MB)
008 Minimum Information Principle.mp4 (6.84 MB)
009 Using Search Engines Google Hacking.mp4 (40.65 MB)
010 Shodan.mp4 (8.21 MB)
011 Web Archives.mp4 (10.62 MB)
012 FOCA - Fingerprinting Organisations with Collected Archives.mp4 (20.25 MB)
013 Maltego - Visual Link Analysis Tool.mp4 (20.3 MB)
001 Passive Scan - Definition.mp4 (5.87 MB)
002 Passive Scan - ARP Tables.mp4 (45.47 MB)
003 Passive Scan - Wireshark.mp4 (84.43 MB)
004 Wireshark Following Stream.mp4 (35.28 MB)
005 Wireshark Summarise Network.mp4 (81.81 MB)
006 MitM Listening to the traffic.mp4 (4.17 MB)
007 Sniffing.mp4 (2.59 MB)
008 TCPDump.mp4 (10.53 MB)
009 Router, Switch, Hub.mp4 (10.65 MB)
010 How to Expand Sniffing Space.mp4 (19.56 MB)
011 MAC Flood Switching.mp4 (10.17 MB)
012 MAC Flood Using Macof Tool.mp4 (91.11 MB)
013 MacFlood - Countermeasures.mp4 (3.03 MB)
014 ARP Spoof.mp4 (9.58 MB)
015 ARP Cache Poisoning using Ettercap.mp4 (111.93 MB)
016 DHCP Starvation & DHCP Spoofing.mp4 (9.03 MB)
017 DHCP Mechanism.mp4 (23.27 MB)
018 DHCP Starvation - Scenario.mp4 (9.47 MB)
019 DHCP Starvation Demonstration with Yersinia.mp4 (122.4 MB)
020 VLAN Hopping.mp4 (5.11 MB)
021 VLAN Hopping Switch Spoofing.mp4 (4.43 MB)
022 VLAN Hopping Double Tagging.mp4 (6.75 MB)
001 What is Nmap.mp4 (24.93 MB)
002 Nmap First Scan.mp4 (23.97 MB)
003 Interpretation of Nmap Results.mp4 (5.93 MB)
004 Scanning Specific IPs or Specific Targets With Nmap.mp4 (6.82 MB)
005 Nmap IP List Creation.mp4 (13.64 MB)
006 Nmap Random Scan and Exclude Ips.mp4 (11.83 MB)
007 Input-Output Management.mp4 (86.18 MB)
008 What is Port Nmap Port Scan.mp4 (8.72 MB)
009 Scanning Top 20, Top 100 Ports With Nmap.mp4 (21.54 MB)
010 Scanning Specific Ports With Nmap.mp4 (14.89 MB)
011 Nmap Syn Scannig.mp4 (6.18 MB)
012 Nmap TCP Scan.mp4 (6.15 MB)
013 Nmap UDP Scan.mp4 (9.33 MB)
014 Nmap FiN, Xmas, Null and ACK Scan in Ethical Hacking.mp4 (7.22 MB)
015 Discovering hosts with ARP ping scans.mp4 (28.83 MB)
016 Discovering hosts with ICMP ping scans.mp4 (8.52 MB)
017 Nmap Fast Scan.mp4 (3.39 MB)
018 Nmap Open Ports Scan.mp4 (4.9 MB)
019 Nmap No PORT Scan.mp4 (8.16 MB)
020 Nmap PING and noPING Scan.mp4 (21.18 MB)
021 Nmap Verbose Command.mp4 (8.12 MB)
022 Nmap Version Detection.mp4 (86.14 MB)
023 Nmap Operating System Detection.mp4 (74.22 MB)
024 Nmap Script Engine (NSE).mp4 (79.25 MB)
025 Nmap Script Engine Example - 1.mp4 (22.89 MB)
026 Nmap Script Engine Example - 2.mp4 (8.19 MB)
027 NMAP Brute Force Attacks.mp4 (36.39 MB)
028 Nmap Timing Templates.mp4 (6.2 MB)
029 Bypass of IPS & IDS Systems With Nmap.mp4 (73.53 MB)
001 Why Metasploit Framework AKA MSF.mp4 (12.2 MB)
002 Importance of Penetration Testing.mp4 (8.22 MB)
003 Penetration Testing Execution Standard.mp4 (11.98 MB)
004 Requirements ( Like Storage Processor ).mp4 (6.87 MB)
005 Lab Connectivity and Taking Snapshots.mp4 (6.19 MB)
006 Evolution of Metasploit.mp4 (9.5 MB)
007 Metasploit Filesystem and Libraries.mp4 (15.71 MB)
008 The Architecture of MSF.mp4 (5.56 MB)
009 Auxiliary Modules.mp4 (14.49 MB)
010 Payload Modules.mp4 (27.69 MB)
011 Exploit Modules.mp4 (11.75 MB)
012 Encoder Modules.mp4 (21.28 MB)
013 Post Modules.mp4 (14.77 MB)
014 Metasploit Editions.mp4 (9.8 MB)
015 Metasploit Community.mp4 (21.41 MB)
016 Metasploit Interfaces.mp4 (17.51 MB)
017 Armitage.mp4 (6.33 MB)
018 MSFconsole.mp4 (22.56 MB)
019 MSFConsole Basic Commands 1.mp4 (23.75 MB)
020 MSFConsole Basic Commands 2.mp4 (49.83 MB)
021 MSFConsole Basic Commands 3.mp4 (12.16 MB)
022 Using Databases in MSF 1.mp4 (14.43 MB)
023 Using Databases in MSF 2.mp4 (9.46 MB)
024 More on Exploits in MSF.mp4 (7.47 MB)
001 What is Enumeration.mp4 (4.72 MB)
002 SMB and Samba Enumeration.mp4 (39.89 MB)
003 MySQL Enumeration.mp4 (29.18 MB)
004 FTP Enumeration.mp4 (47.38 MB)
005 SSH Enumeration.mp4 (30.54 MB)
006 HTTP Enumeration.mp4 (17.46 MB)
007 SNMP Enumeration.mp4 (10.38 MB)
008 SMTP Enumeration.mp4 (15.2 MB)
009 NMAP DNS Enumeration.mp4 (19.14 MB)
010 NMAP HTTP Enumeration.mp4 (9.65 MB)
011 NMAP MySQL Enumeration.mp4 (18.24 MB)
012 NMAP SMB Enumeration.mp4 (11.92 MB)
013 NMAP SNMP Enumeration.mp4 (16.48 MB)
001 Terminologies Part 1.mp4 (20.8 MB)
002 Terminologies Part 2.mp4 (17.83 MB)
003 Creating Malware and Terminologies.mp4 (13.19 MB)
004 MSFvenom Part 1.mp4 (155.58 MB)
005 MSFvenom Part 2.mp4 (11.13 MB)
006 Veil Installation.mp4 (29.75 MB)
007 Veil in Action.mp4 (21.7 MB)
008 TheFatRat Installation.mp4 (18.18 MB)
009 TheFatRat in Action.mp4 (59.91 MB)
010 Embedding Malware in PDF.mp4 (31.55 MB)
011 Embedding Malware in WORD.mp4 (84.59 MB)
012 Embedding Malware in Firefox Add-on.mp4 (27.69 MB)
013 Empire Installation.mp4 (19.12 MB)
014 Empire in Action Part 1.mp4 (84.31 MB)
015 Empire in Action Part 2.mp4 (63.47 MB)
016 Exploiting Java Vulnerabilities.mp4 (21.62 MB)
017 Social Engineering Toolkit.mp4 (24.94 MB)
018 Sending Fake Emails - Phishing.mp4 (3.48 MB)
019 Vishing - Voice Phishing.mp4 (18.6 MB)
001 Hardware and Software Requiments.mp4 (24.41 MB)
002 Wi-Fi Adapter Settings.mp4 (43.62 MB)
003 IEE-802 11.mp4 (11.44 MB)
004 Basic Terminologies and Concepts.mp4 (11.69 MB)
005 Wireless Operating Modes.mp4 (15.39 MB)
006 MAC Frame Structure.mp4 (13.68 MB)
007 Wireless Packet Types.mp4 (11.65 MB)
008 Wireshark Analysing Packet Types.mp4 (80.38 MB)
009 Wi-Fi Network Interaction.mp4 (18.38 MB)
010 Wireless Encryption Protocols WEP vs WPA.mp4 (10.68 MB)
011 WPA 4-Way Handshake.mp4 (14.68 MB)
012 WPA2 Personal and Enterprise.mp4 (8.12 MB)
013 Wireshark WEP and WPA.mp4 (4.2 MB)
014 Wi-Fi Protected Setup (WPS).mp4 (10.33 MB)
015 Wireless Recon with Bettercap.mp4 (45.95 MB)
016 Wardriving with Kismet Configuration.mp4 (30.67 MB)
017 Wardriving with Kismet Mapping.mp4 (62.34 MB)
018 Airbase-ng.mp4 (25.24 MB)
019 Evil Twin Attack.mp4 (36.07 MB)
020 Wifi Pumpkin 3.mp4 (52.77 MB)
021 WEP Cracking - Fake Authentication Attack.mp4 (27.33 MB)
022 WEP Cracking - Deauthentication Attack.mp4 (29.22 MB)
023 WEP Cracking - Deauthentication Attack with Bettercap.mp4 (21.51 MB)
024 WEP Cracking - ARP Request Replay Attack.mp4 (18.03 MB)
025 WEP Cracking - Fragmentation Attack.mp4 (12.93 MB)
026 WEP Cracking - ChopChop Attack.mp4 (14.86 MB)
027 WPAWPA2 Cracking - Introduction.mp4 (33.86 MB)
028 WPAWPA2 Cracking - Aircrack-ng.mp4 (13.11 MB)
029 WPAWPA2 Cracking - John The Ripper.mp4 (29.97 MB)
030 WPAWPA2 Cracking - CoWPAtty.mp4 (15.53 MB)
031 WPAWPA2 Cracking - Wifite 2.mp4 (9.16 MB)
032 WPAWPA2 Cracking with GPUs Hashcat.mp4 (82.93 MB)
033 WPAWPA2 Cracking - Key Reinstallation Attack (KRACK).mp4 (79.84 MB)
034 WPS Cracking - Wifite 2 PIN Attack.mp4 (13.3 MB)
001 Reflected Cross-Site Scripting Attacks.mp4 (43.14 MB)
002 Reflected Cross-Site Scripting over JSON.mp4 (41.95 MB)
003 Stored Cross-Site Scripting Attacks.mp4 (71.53 MB)
004 DOM Based Cross-Site Scripting Attacks.mp4 (37.05 MB)
005 Inband SQL Injection over a Search Form.mp4 (86.89 MB)
006 Inband SQL Injection over a Select Form.mp4 (40.03 MB)
007 Error-Based SQL Injection over a Login Form.mp4 (63.35 MB)
008 SQL Injection over Insert Statement.mp4 (52.08 MB)
009 Boolean Based Blind SQL Injection.mp4 (35.04 MB)
010 Time Based Blind SQL Injection.mp4 (42.64 MB)
011 Detecting and Exploiting SQL Injection with SQLmap.mp4 (76.8 MB)
012 Detecting and Exploiting Error Based SQL Injection with SQLmap.mp4 (28.24 MB)
013 Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap.mp4 (49.52 MB)
014 Command Injection Introduction.mp4 (24.91 MB)
015 Automate Command Injection Attacks Commix.mp4 (32.3 MB)
016 XMLXPATH Injection.mp4 (126.08 MB)
017 SMTP Mail Header Injection.mp4 (63.96 MB)
018 PHP Code Injection.mp4 (24.68 MB)
019 Zed Attack Proxy (ZAP) A Web App Vulnerability Scanner.mp4 (6.8 MB)
020 Introduction to Burp Downloading, Installing and Running.mp4 (26.03 MB)
021 Intercepting HTTP Traffic with Burp Suite.mp4 (37.08 MB)
022 Intercepting HTTPS Traffic with Burp Suite.mp4 (10.63 MB)
001 Definition.mp4 (5.47 MB)
002 Creating a Password List Crunch.mp4 (27.84 MB)
003 Differece Between HTTP and HTTPS Traffic Wireshark.mp4 (14.7 MB)
004 Attacking Insecure Login Mechanisms.mp4 (39.27 MB)
005 Attacking Insecure Logout Mechanisms.mp4 (17.28 MB)
006 Attacking Improper Password Recovery Mechanisms.mp4 (25.42 MB)
007 Attacking Insecure CAPTCHA Implementations.mp4 (73 MB)
008 Path Traversal Directory.mp4 (59.12 MB)
009 Path Traversal File.mp4 (39.46 MB)
010 Introduction to File Inclusion Vulnerabilities.mp4 (28.68 MB)
011 Local File Inclusion Vulnerabilities.mp4 (38.16 MB)
001 Post-Exploitation.mp4 (8.42 MB)
002 What is "Persistence".mp4 (4.01 MB)
003 Meterpreter's Persistence module.mp4 (77.3 MB)
004 Removing the Backdoor.mp4 (45.55 MB)
001 What is IoT.mp4 (12.16 MB)
002 Where does IoT Exist in Our Lives.mp4 (4 MB)
003 How does IoT work.mp4 (1.78 MB)
004 Connection Standarts.mp4 (24.11 MB)
005 IoT Security.mp4 (52.95 MB)
006 Mobile Security Threats.mp4 (20.52 MB)
001 Bash Scripting 101.mp4 (8.94 MB)
001 Installing Anaconda Distribution For Windows in Python.mp4 (16.23 MB)
002 Installing Python 3 9 7 and PyCharm For Windows in Python.mp4 (14.64 MB)
003 Variables in python.mp4 (21.92 MB)
004 Numbers in Python.mp4 (18.8 MB)
005 String Operations and Useful String Methods in python examples.mp4 (11.35 MB)
006 Data Type Conversion in Python.mp4 (7.72 MB)
007 Exercise Company Email Generator in python.mp4 (5.16 MB)
008 Conditionals in python.mp4 (3.14 MB)
009 bool() Function in Python.mp4 (3.82 MB)
010 Comparison and Logical Operators in Python.mp4 (17.89 MB)
011 If Statements in Python.mp4 (18.87 MB)
012 Exercise Calculator.mp4 (24.04 MB)
013 Loops in Python.mp4 (2.62 MB)
014 While Loops in Python.mp4 (7.74 MB)
015 For Loops in python.mp4 (21.91 MB)
016 Range Function in Python.mp4 (7.8 MB)
017 Control Statements in python.mp4 (17 MB)
018 Functions in Python Programming.mp4 (4.44 MB)
019 Create A New Function and Function Calls in Python programming.mp4 (9.45 MB)
020 Return Statement in python.mp4 (20.68 MB)
021 Lambda Functions in Python.mp4 (5.25 MB)
022 Lists and List Operations in Python Programming.mp4 (9.71 MB)
023 List Methods in Python Programming.mp4 (12.09 MB)
024 Dictionaries in Python Hands-on.mp4 (60.26 MB)
025 Dictionary Comprehensions in Python Hands-on.mp4 (3.93 MB)
026 Logic of OOP in Object Oriented Programming (OOP).mp4 (9.07 MB)
027 Constructor in Object Oriented Programming (OOP).mp4 (13.47 MB)
028 Methods in Object Oriented Programming (OOP).mp4 (21.52 MB)
029 Inheritance in Object Oriented Programming (OOP).mp4 (20.5 MB)
030 Overriding and Overloading in Object Oriented Programming (OOP).mp4 (53.4 MB)]
Screenshot
Code:
https://fikper.com/5qxOXR9UuK/
https://fikper.com/18Hq1uXVwJ/
https://fikper.com/kCq9i4uUfU/
https://fikper.com/TsbZne3NhB/
Code:
https://rapidgator.net/file/adfca2c555fc5d50351b57f76c43ddf3/
https://rapidgator.net/file/95379aa040cc82d07e795dfcfb14adc1/
https://rapidgator.net/file/2f41fd7ca2bc546c985d1a3d0e390332/
https://rapidgator.net/file/ea2febe8dcbced5674f086c6c69e3adf/
Code:
https://turbobit.net/ahkfsopu1i0k.html
https://turbobit.net/0m9zvhs2k93b.html
https://turbobit.net/j6ohdz64iqe3.html
https://turbobit.net/poyyggm5ve94.html