[FreeCoursesOnline.Me] PacktPub - Offensive Hacking Unfolded - Become a Pro Pentester in 2023!
1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp4 43.8 MB 1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt 9.7 KB 1. Opening Lectures/2. Disclaimer.html 1.6 KB 1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html 2.5 KB 1. Opening Lectures/4. What can you do to get the most out of this course.mp4 36.2 MB 1. Opening Lectures/4. What can you do to get the most out of this course.srt 6.7 KB 1. Opening Lectures/5. How to get answers to your questions and help with problems.mp4 35.8 MB 1. Opening Lectures/5. How to get answers to your questions and help with problems.srt 7.1 KB 10. Happy Ending Lectures/1. How to go more advanced with this course.html 3 KB 10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4 16.4 MB 10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt 2.9 KB 10. Happy Ending Lectures/3. What's your next step after doing this course.html 1.2 KB 10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp4 5.4 MB 10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt 3.1 KB 11. BONUS Section/1. Bonus Lecture.html 2.1 KB 2. Fundamentals/1. Lab Setup using the VMware Player.mp4 110.9 MB 2. Fundamentals/1. Lab Setup using the VMware Player.srt 17.6 KB 2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html 114 B 2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html 133 B 2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html 6.5 KB 2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html 2 KB 2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4 184.3 MB 2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt 37.3 KB 3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4 113.5 MB 3. Information Gathering/1. Passive Reconnaissance - Part 1.srt 15 KB 3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4 136.7 MB 3. Information Gathering/2. Passive Reconnaissance - Part 2.srt 16 KB 3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4 129.4 MB 3. Information Gathering/3. Passive Reconnaissance - Part 3.srt 14.7 KB 3. Information Gathering/4. Store Passive Data in the Right Way.html 4 KB 3. Information Gathering/5. Active Reconnaissance - Part 1.mp4 87.3 MB 3. Information Gathering/5. Active Reconnaissance - Part 1.srt 13.2 KB 3. Information Gathering/6. Active Reconnaissance - Part 2.mp4 118.5 MB 3. Information Gathering/6. Active Reconnaissance - Part 2.srt 17.4 KB 3. Information Gathering/7. Active Reconnaissance - Part 3.mp4 75.8 MB 3. Information Gathering/7. Active Reconnaissance - Part 3.srt 13.7 KB 3. Information Gathering/8. Store Active Data in the Right Way.html 662 B 3. Information Gathering/8.1 Target DB.xlsx 10.4 KB 4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html 995 B 4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4 235.2 MB 4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt 33.6 KB 4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4 157.4 MB 4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt 28.9 KB 4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp4 60.4 MB 4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt 12.8 KB 5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4 258.8 MB 5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt 42.4 KB 5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4 224.7 MB 5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt 39 KB 5. Exploitation/3. Essential Things You Should Know.html 1.1 KB 6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4 111.6 MB 6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt 19.3 KB 6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4 120 MB 6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt 18.4 KB 6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4 57.7 MB 6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt 11.5 KB 6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4 111.5 MB 6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt 18.2 KB 6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4 237.5 MB 6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt 33.9 KB 6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4 179.9 MB 6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt 24.7 KB 6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4 124.8 MB 6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt 19.2 KB 6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4 194.9 MB 6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt 34.9 KB 6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4 144.7 MB 6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt 21.7 KB 6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4 123.7 MB 6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt 18.6 KB 6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4 123.6 MB 6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt 16.5 KB 7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html 1.5 KB 7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp4 55.4 MB 7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt 10 KB 7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4 167.2 MB 7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt 19.9 KB 7. Network PenTesting/13. Spawning Stable Shells.html 2.3 KB 7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4 128.8 MB 7. Network PenTesting/2. The Core of Network Testing - Part 1.srt 21.5 KB 7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4 213.4 MB 7. Network PenTesting/3. The Core of Network Testing - Part 2.srt 23.2 KB 7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4 101.4 MB 7. Network PenTesting/4. The Core of Network Testing - Part 3.srt 14.2 KB 7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4 114 MB 7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt 17.6 KB 7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp4 81.2 MB 7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt 15.2 KB 7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp4 79.3 MB 7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt 13.9 KB 7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4 158.3 MB 7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt 22.7 KB 7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4 142.7 MB 7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt 22.3 KB 8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html 1 KB 8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html 3.1 KB 8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp4 65.2 MB