Magnetic link has been copied to the cutting board

Name [ CoursePig.com ] Linkedin - CompTIA Pentest + (PT0-002) Cert Prep - 3 Attacks and Exploits (2022)

File Type video

Size 3.77GB

UpdateDate 2024-9-24

hash *****E669C339B999B13C8196DCD897B91CB3FD

Hot 35

Files Get Bonus Downloads Here.url | 179B ~Get Your Files Here !/01 - 1. Network-Based Attacks/01 - Exploit resources and network attacks.mp4 | 84.72MB ~Get Your Files Here !/01 - 1. Network-Based Attacks/01 - Exploit resources and network attacks.srt | 7.56KB ~Get Your Files Here !/01 - 1. Network-Based Attacks/02 - Network-based exploits.mp4 | 83.97MB ~Get Your Files Here !/01 - 1. Network-Based Attacks/02 - Network-based exploits.srt | 12.53KB ~Get Your Files Here !/01 - 1. Network-Based Attacks/03 - FTP exploit demo.mp4 | 81.26MB ~Get Your Files Here !/01 - 1. Network-Based Attacks/03 - FTP exploit demo.srt | 12.21KB ~Get Your Files Here !/01 - 1. Network-Based Attacks/04 - Man-in-the-middle exploits.mp4 | 85.91MB ~Get Your Files Here !/01 - 1. Network-Based Attacks/04 - Man-in-the-middle exploits.srt | 11.43KB ~Get Your Files Here !/01 - 1. Network-Based Attacks/05 - Labtainers lab TCPIP attacks.mp4 | 35.04MB ~Get Your Files Here !/01 - 1. Network-Based Attacks/05 - Labtainers lab TCPIP attacks.srt | 3.43KB ~Get Your Files Here !/01 - 1. Network-Based Attacks/06 - Labtainers lab ARP spoof attack.mp4 | 21.98MB ~Get Your Files Here !/01 - 1. Network-Based Attacks/06 - Labtainers lab ARP spoof attack.srt | 3.01KB ~Get Your Files Here !/01 - 1. Network-Based Attacks/07 - Labtainers lab Local DNS attacks.mp4 | 22.09MB ~Get Your Files Here !/01 - 1. Network-Based Attacks/07 - Labtainers lab Local DNS attacks.srt | 2.63KB ~Get Your Files Here !/01 - 1. Network-Based Attacks/08 - Labtainers lab MACs and hash functions.mp4 | 16.88MB ~Get Your Files Here !/01 - 1. Network-Based Attacks/08 - Labtainers lab MACs and hash functions.srt | 2.41KB ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/01 - Wireless exploits, part 1.mp4 | 158.47MB ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/01 - Wireless exploits, part 1.srt | 22.36KB ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/02 - Wireless exploits, part 2.mp4 | 28.77MB ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/02 - Wireless exploits, part 2.srt | 4.49KB ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/03 - Antennas.mp4 | 66.63MB ~Get Your Files Here !/02 - 2. Wireless and RF Attacks/03 - Antennas.srt | 6.15KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/01 - OWASP Top 10.mp4 | 160.60MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/01 - OWASP Top 10.srt | 13.88KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/02 - Application exploits, part 1.mp4 | 64.33MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/02 - Application exploits, part 1.srt | 8.81KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/03 - SQL injection demo.mp4 | 84.48MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/03 - SQL injection demo.srt | 13.19KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/04 - Labtainers lab SQL injection.mp4 | 32.63MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/04 - Labtainers lab SQL injection.srt | 4.36KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/05 - Application exploits, part 2.mp4 | 95.09MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/05 - Application exploits, part 2.srt | 13.77KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/06 - Application exploits, part 3.mp4 | 107.41MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/06 - Application exploits, part 3.srt | 14.65KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/07 - Cross-site scripting demo.mp4 | 65.45MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/07 - Cross-site scripting demo.srt | 11.12KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/08 - Labtainers lab Cross-site scripting.mp4 | 20.06MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/08 - Labtainers lab Cross-site scripting.srt | 2.70KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/09 - Labtainers lab Cross-site request forgery.mp4 | 16.79MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/09 - Labtainers lab Cross-site request forgery.srt | 1.86KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/10 - Code vulnerabilities.mp4 | 197.77MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/10 - Code vulnerabilities.srt | 29.52KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/11 - API attacks and attack resources.mp4 | 113.45MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/11 - API attacks and attack resources.srt | 9.85KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/12 - Privilege escalation Linux.mp4 | 113.56MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/12 - Privilege escalation Linux.srt | 15.71KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/13 - Privilege escalation Windows.mp4 | 71.74MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/13 - Privilege escalation Windows.srt | 11.28KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/14 - Miscellaneous privilege escalation.mp4 | 97.31MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/14 - Miscellaneous privilege escalation.srt | 12.39KB ~Get Your Files Here !/03 - 3. Web and Database Attacks/15 - Miscellaneous local host vulnerabilities.mp4 | 95.50MB ~Get Your Files Here !/03 - 3. Web and Database Attacks/15 - Miscellaneous local host vulnerabilities.srt | 13.29KB ~Get Your Files Here !/04 - 4. Attacking the Cloud/01 - Cloud attacks, part 1.mp4 | 68.60MB ~Get Your Files Here !/04 - 4. Attacking the Cloud/01 - Cloud attacks, part 1.srt | 7.68KB ~Get Your Files Here !/04 - 4. Attacking the Cloud/02 - Cloud attacks, part 2.mp4 | 88.03MB ~Get Your Files Here !/04 - 4. Attacking the Cloud/02 - Cloud attacks, part 2.srt | 7.54KB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/01 - Mobile attacks.mp4 | 193.51MB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/01 - Mobile attacks.srt | 16.46KB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/02 - IoT attacks.mp4 | 196.30MB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/02 - IoT attacks.srt | 16.44KB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/03 - Data storage and management interface attacks.mp4 | 167.51MB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/03 - Data storage and management interface attacks.srt | 13.99KB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/04 - Virtual and containerized environment attacks.mp4 | 137.21MB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/04 - Virtual and containerized environment attacks.srt | 11.47KB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/05 - Labtainers lab Industrial control system.mp4 | 26.15MB ~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/05 - Labtainers lab Industrial control system.srt | 2.78KB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/01 - Pretext for a social engineering attack.mp4 | 41.85MB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/01 - Pretext for a social engineering attack.srt | 3.82KB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/02 - Remote social engineering.mp4 | 72.18MB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/02 - Remote social engineering.srt | 9.65KB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/03 - Spear phishing demo.mp4 | 106.76MB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/03 - Spear phishing demo.srt | 16.30KB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/04 - In-person social engineering.mp4 | 140.54MB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/04 - In-person social engineering.srt | 19.12KB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/05 - Physical security.mp4 | 133.31MB ~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/05 - Physical security.srt | 20.26KB ~Get Your Files Here !/07 - 7. Post-Exploitation/01 - Post-exploitation techniques.mp4 | 116.87MB ~Get Your Files Here !/07 - 7. Post-Exploitation/01 - Post-exploitation techniques.srt | 18.08KB ~Get Your Files Here !/07 - 7. Post-Exploitation/02 - Post-exploitation tools.mp4 | 58.22MB ~Get Your Files Here !/07 - 7. Post-Exploitation/02 - Post-exploitation tools.srt | 5.49KB ~Get Your Files Here !/07 - 7. Post-Exploitation/03 - Network segmentation testing.mp4 | 53.98MB ~Get Your Files Here !/07 - 7. Post-Exploitation/03 - Network segmentation testing.srt | 3.94KB ~Get Your Files Here !/07 - 7. Post-Exploitation/04 - Persistence and stealth.mp4 | 123.07MB ~Get Your Files Here !/07 - 7. Post-Exploitation/04 - Persistence and stealth.srt | 17.88KB ~Get Your Files Here !/07 - 7. Post-Exploitation/05 - Detection avoidance techniques.mp4 | 118.40MB ~Get Your Files Here !/07 - 7. Post-Exploitation/05 - Detection avoidance techniques.srt | 9.52KB ~Get Your Files Here !/Bonus Resources.txt | 386B

Recommend

Magnetic link has been copied to the cutting board