[FreeCoursesOnline.Me] PacktPub - Cybersecurity Attacks (Red Team Activity) [Video]
0. Websites you may like/How you can help our Group!.txt 208 B 1 - Building Our Lab/Getting Acquainted with Kali Linux Easy Way.mp4 115.5 MB 1 - Building Our Lab/Getting Acquainted with Terminal Commands.mp4 100.9 MB 1 - Building Our Lab/Installing Kali Linux on Virtual Machine.mp4 24.3 MB 1 - Building Our Lab/Installing Metasploitable 2 on Virtual Machine.mp4 32.9 MB 1 - Building Our Lab/The Course Overview.mp4 25.8 MB 1 - Building Our Lab/Tune Up Python.mp4 8.5 MB 1 - Building Our Lab/What is Kali Linux and Why We Should Use it.mp4 16.7 MB 2 - Attacking a Network/Advance-Level Hacking - Scanning Hosts with Python Script.mp4 25.7 MB 2 - Attacking a Network/Creating Reverse Shell with Metasploit.mp4 40.1 MB 2 - Attacking a Network/Hidden Scanning Ports with Nmap.mp4 35.4 MB 2 - Attacking a Network/Intercepting Traffic with Wireshark.mp4 25.6 MB 2 - Attacking a Network/Leaving a Backdoor in the Target Machine.mp4 10.6 MB 2 - Attacking a Network/Network Attack Vectors.mp4 23.2 MB 2 - Attacking a Network/Scanning the Network with OpenVas.mp4 24.3 MB 2 - Attacking a Network/Taking Control Over Target Browser with BeEf.mp4 44.5 MB 2 - Attacking a Network/Types of man-in-the-middle Attack.mp4 21 MB 3 - Website and Web-Application Attacks#/Breaking Database with SQL Injection.mp4 8.1 MB 3 - Website and Web-Application Attacks#/Executing a Session Hijacking.mp4 30.5 MB 3 - Website and Web-Application Attacks#/Executing Reflected XSS.mp4 19.1 MB 3 - Website and Web-Application Attacks#/Executing SQL Injection with SQLmap.mp4 23 MB 3 - Website and Web-Application Attacks#/Exploring Target with Browser.mp4 27.5 MB 3 - Website and Web-Application Attacks#/Infecting Website with Stored XSS.mp4 25.5 MB 3 - Website and Web-Application Attacks#/Manual Testing for SQL Injection.mp4 32.8 MB 3 - Website and Web-Application Attacks#/Proxy Attack with Burp Suite.mp4 36.7 MB 3 - Website and Web-Application Attacks#/Scanning Web-Application with OWASP ZAP.mp4 24.3 MB 3 - Website and Web-Application Attacks#/Using Python Script to Find Vulnerabilities.mp4 16.2 MB 4 - Breaking the Human in a Cyber Crime Attack/Creating a Malicious File with SET.mp4 22.7 MB 4 - Breaking the Human in a Cyber Crime Attack/Creating and Delivering Malicious USB Card.mp4 18.2 MB 4 - Breaking the Human in a Cyber Crime Attack/Gathering Emails and Phone Numbers with Maltego.mp4 18.7 MB 4 - Breaking the Human in a Cyber Crime Attack/How to Hack Without Getting in Touch with a Target.mp4 28.9 MB 4 - Breaking the Human in a Cyber Crime Attack/Learning Spear-Phishing Methods for VIP.mp4 10.5 MB 4 - Breaking the Human in a Cyber Crime Attack/Looking for Secrets in Social Media with Online Tools.mp4 24.9 MB 4 - Breaking the Human in a Cyber Crime Attack/Making a Phishing Email with SET.mp4 27.1 MB 4 - Breaking the Human in a Cyber Crime Attack/Playing on Human Emotions and Weaknesses to Get the Information.mp4 73.1 MB 4 - Breaking the Human in a Cyber Crime Attack/Social Engineering Techniques.mp4 39.3 MB V08631_Code.zip 4.4 KB