BT种子基本信息
- 种子哈希:63ca4ec99df9988e8942a979af21db18bffaf849
- 文档大小:1.5 GB
- 文档个数:110个文档
- 下载次数:4618次
- 下载速度:极快
- 收录时间:2023-05-06
- 最近下载:2024-11-14
- DMCA/屏蔽:DMCA/屏蔽
文档列表
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/003. 1.2 Understanding Enterprise Wide Penetration Testing.mp4 88.0 MB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/002. 1.1 Introducing Red Teams and Enterprise Hacking.mp4 69.0 MB
- Lesson 3 Enterprise Social Engineering/004. 3.3 Exploiting Social Engineering Tools.mp4 62.9 MB
- Lesson 2 External and Internal Reconnaissance/003. 2.2 Understanding Passive Recon.mp4 59.0 MB
- Lesson 4 Network and Vulnerability Scanning/005. 4.4 Exploring How to Automate Scans.mp4 56.3 MB
- Lesson 2 External and Internal Reconnaissance/002. 2.1 Understanding the Red Team Environment.mp4 54.8 MB
- Lesson 5 Web App Testing/003. 5.2 Exploring Web App Testing Essential Tools.mp4 54.0 MB
- Lesson 3 Enterprise Social Engineering/002. 3.1 Surveying Social Engineering Methodologies.mp4 50.3 MB
- Lesson 4 Network and Vulnerability Scanning/007. 4.6 Exploring Vulnerability Scanners.mp4 48.9 MB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/006. 1.5 Surveying Operational Processes and Policies for .mp4 46.7 MB
- Lesson 9 Cloud Services/002. 9.1 Understanding the Challenge of Testing Cloud Services.mp4 46.2 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/004. 8.3 Understanding How to Compromise User Credentials.mp4 42.6 MB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/005. 1.4 Exploring How to Plan and Fund a Red Team.mp4 41.0 MB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/004. 1.3 Understanding the Difference Between Red and Blue.mp4 34.9 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/007. 8.6 Searching for Sensitive Data.mp4 34.0 MB
- Lesson 3 Enterprise Social Engineering/003. 3.2 Understanding How to Target Employees.mp4 33.4 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/008. 8.7 Understanding Data Exfiltration Techniques.mp4 33.4 MB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/008. 1.7 Understanding Red Team Collaboration.mp4 33.1 MB
- Lesson 2 External and Internal Reconnaissance/004. 2.3 Understanding Active Recon.mp4 31.6 MB
- Lesson 7 Privilege Escalation/002. 7.1 Learning Privilege Escalation Methodologies.mp4 31.3 MB
- Lesson 4 Network and Vulnerability Scanning/003. 4.2 Understanding the Operational Impact of Enterprise-wide Scanning.mp4 30.7 MB
- Lesson 4 Network and Vulnerability Scanning/006. 4.5 Using Shodan and Its API.mp4 29.6 MB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/007. 1.6 Understanding How to Create and Hire the Red Team.mp4 29.4 MB
- Lesson 5 Web App Testing/004. 5.3 Understanding Enterprise Application Continuous Testing.mp4 28.7 MB
- Lesson 10 Reporting and Continuous Evaluation/002. 10.1 Surveying Final Reports for Transactional Penetration Testing Events.mp4 28.4 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/009. 8.8 Understanding How to Cover Your Tracks.mp4 27.0 MB
- Introduction/001. Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking Introduction.mp4 24.7 MB
- Lesson 6 Internal Testing/003. 6.2 Understanding What Hosts to Target and the Scope of the Testing.mp4 24.3 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/003. 8.2 Learning How to Achieve Domain Admin Access.mp4 24.1 MB
- Lesson 9 Cloud Services/003. 9.2 Exploring How to Test in the Cloud.mp4 23.8 MB
- Lesson 6 Internal Testing/004. 6.3 Exploring the Hidden Cost of Open Source Software.mp4 23.0 MB
- Lesson 7 Privilege Escalation/003. 7.2 Understanding Lateral Movement.mp4 22.3 MB
- Lesson 6 Internal Testing/005. 6.4 Learning How to Host Enterprise Capture the Flag Events.mp4 21.0 MB
- Lesson 4 Network and Vulnerability Scanning/002. 4.1 Exploring Network and Vulnerability Scanning Methodologies.mp4 19.7 MB
- Lesson 7 Privilege Escalation/004. 7.3 Surveying Privilege Escalation Essential Tools.mp4 19.1 MB
- Lesson 4 Network and Vulnerability Scanning/004. 4.3 Understanding Scanning Tools.mp4 17.8 MB
- Summary/001. Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking Summary.mp4 17.0 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/005. 8.4 Surveying Password Cracking and Reporting.mp4 16.4 MB
- Lesson 5 Web App Testing/002. 5.1 Exploring How to Target Hosts.mp4 16.4 MB
- Lesson 4 Network and Vulnerability Scanning/008. 4.7 Understanding Binary and Source Code Scanners.mp4 16.0 MB
- Lesson 4 Network and Vulnerability Scanning/009. 4.8 Understanding How to Perform Continuous Monitoring.mp4 14.3 MB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/001. Learning objectives.mp4 13.2 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/006. 8.5 Understanding That Domain Admin Is Not the End Goal.mp4 10.5 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/001. Learning objectives.mp4 10.4 MB
- Lesson 6 Internal Testing/002. 6.1 Understanding How to Initially Get on the Network.mp4 10.1 MB
- Lesson 10 Reporting and Continuous Evaluation/003. 10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring.mp4 8.5 MB
- Lesson 4 Network and Vulnerability Scanning/001. Learning objectives.mp4 7.8 MB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/002. 8.1 Understanding Persistent Access.mp4 6.3 MB
- Lesson 7 Privilege Escalation/001. Learning objectives.mp4 5.7 MB
- Lesson 2 External and Internal Reconnaissance/001. Learning objectives.mp4 5.3 MB
- Lesson 5 Web App Testing/001. Learning objectives.mp4 5.0 MB
- Lesson 10 Reporting and Continuous Evaluation/001. Learning objectives.mp4 4.3 MB
- Lesson 9 Cloud Services/001. Learning objectives.mp4 4.3 MB
- Lesson 3 Enterprise Social Engineering/001. Learning objectives.mp4 3.9 MB
- Lesson 6 Internal Testing/001. Learning objectives.mp4 3.3 MB
- Lesson 2 External and Internal Reconnaissance/003. 2.2 Understanding Passive Recon en.srt 17.0 kB
- Lesson 4 Network and Vulnerability Scanning/003. 4.2 Understanding the Operational Impact of Enterprise-wide Scanning en.srt 16.0 kB
- Lesson 4 Network and Vulnerability Scanning/007. 4.6 Exploring Vulnerability Scanners en.srt 15.6 kB
- Lesson 5 Web App Testing/003. 5.2 Exploring Web App Testing Essential Tools en.srt 12.9 kB
- Lesson 4 Network and Vulnerability Scanning/005. 4.4 Exploring How to Automate Scans en.srt 12.0 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/008. 8.7 Understanding Data Exfiltration Techniques en.srt 11.4 kB
- Lesson 3 Enterprise Social Engineering/004. 3.3 Exploiting Social Engineering Tools en.srt 11.4 kB
- Lesson 7 Privilege Escalation/002. 7.1 Learning Privilege Escalation Methodologies en.srt 11.2 kB
- Lesson 6 Internal Testing/003. 6.2 Understanding What Hosts to Target and the Scope of the Testing en.srt 10.1 kB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/002. 1.1 Introducing Red Teams and Enterprise Hacking en.srt 9.3 kB
- Lesson 5 Web App Testing/002. 5.1 Exploring How to Target Hosts en.srt 9.3 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/004. 8.3 Understanding How to Compromise User Credentials en.srt 8.7 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/007. 8.6 Searching for Sensitive Data en.srt 7.8 kB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/003. 1.2 Understanding Enterprise Wide Penetration Testing.srt 7.6 kB
- Lesson 2 External and Internal Reconnaissance/002. 2.1 Understanding the Red Team Environment en.srt 7.3 kB
- Lesson 4 Network and Vulnerability Scanning/004. 4.3 Understanding Scanning Tools en.srt 7.0 kB
- Lesson 3 Enterprise Social Engineering/002. 3.1 Surveying Social Engineering Methodologies en.srt 6.8 kB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/006. 1.5 Surveying Operational Processes and Policies for .srt 6.4 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/009. 8.8 Understanding How to Cover Your Tracks en.srt 6.3 kB
- Lesson 10 Reporting and Continuous Evaluation/002. 10.1 Surveying Final Reports for Transactional Penetration Testing Events en.srt 6.2 kB
- Lesson 9 Cloud Services/002. 9.1 Understanding the Challenge of Testing Cloud Services en.srt 6.0 kB
- Lesson 9 Cloud Services/003. 9.2 Exploring How to Test in the Cloud en.srt 5.9 kB
- Lesson 4 Network and Vulnerability Scanning/002. 4.1 Exploring Network and Vulnerability Scanning Methodologies en.srt 5.8 kB
- Lesson 5 Web App Testing/004. 5.3 Understanding Enterprise Application Continuous Testing en.srt 5.6 kB
- Lesson 4 Network and Vulnerability Scanning/006. 4.5 Using Shodan and Its API en.srt 5.4 kB
- Lesson 4 Network and Vulnerability Scanning/009. 4.8 Understanding How to Perform Continuous Monitoring en.srt 5.4 kB
- Lesson 6 Internal Testing/002. 6.1 Understanding How to Initially Get on the Network en.srt 5.4 kB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/005. 1.4 Exploring How to Plan and Fund a Red Team en.srt 5.4 kB
- Lesson 6 Internal Testing/004. 6.3 Exploring the Hidden Cost of Open Source Software en.srt 5.3 kB
- Lesson 6 Internal Testing/005. 6.4 Learning How to Host Enterprise Capture the Flag Events en.srt 5.0 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/005. 8.4 Surveying Password Cracking and Reporting en.txt 4.7 kB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/004. 1.3 Understanding the Difference Between Red and Blue.srt 4.6 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/003. 8.2 Learning How to Achieve Domain Admin Access en.srt 4.5 kB
- Lesson 2 External and Internal Reconnaissance/004. 2.3 Understanding Active Recon en.srt 4.4 kB
- Lesson 7 Privilege Escalation/004. 7.3 Surveying Privilege Escalation Essential Tools en.srt 4.4 kB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/008. 1.7 Understanding Red Team Collaboration en.srt 4.2 kB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/007. 1.6 Understanding How to Create and Hire the Red Team.srt 4.1 kB
- Lesson 3 Enterprise Social Engineering/003. 3.2 Understanding How to Target Employees en.srt 4.1 kB
- Lesson 4 Network and Vulnerability Scanning/008. 4.7 Understanding Binary and Source Code Scanners en.srt 3.9 kB
- Introduction/001. Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking Introduction en.srt 3.7 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/002. 8.1 Understanding Persistent Access en.srt 3.3 kB
- Lesson 7 Privilege Escalation/003. 7.2 Understanding Lateral Movement en.srt 3.3 kB
- Summary/001. Enterprise Penetration Testing and Continuous Monitoring The Art of Hacking Summary en.srt 2.6 kB
- Lesson 10 Reporting and Continuous Evaluation/003. 10.2 Surveying Continouos Reporting for Enterprise Continuous Monitoring en.srt 2.6 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/006. 8.5 Understanding That Domain Admin Is Not the End Goal en.srt 1.8 kB
- Lesson 1 Introduction to Enterprise Penetration Testing and Continuous Monitoring/001. Learning objectives en.srt 1.8 kB
- Lesson 8 Enterprise Secrets, Post Exploitation, and Data Exfiltration/001. Learning objectives en.srt 1.3 kB
- Lesson 4 Network and Vulnerability Scanning/001. Learning objectives en.srt 906 Bytes
- Lesson 2 External and Internal Reconnaissance/001. Learning objectives en.srt 671 Bytes
- Lesson 7 Privilege Escalation/001. Learning objectives en.srt 654 Bytes
- Lesson 5 Web App Testing/001. Learning objectives en.srt 594 Bytes
- Lesson 9 Cloud Services/001. Learning objectives en.srt 565 Bytes
- Lesson 10 Reporting and Continuous Evaluation/001. Learning objectives en.srt 541 Bytes
- Lesson 3 Enterprise Social Engineering/001. Learning objectives en.srt 456 Bytes
- Lesson 6 Internal Testing/001. Learning objectives en.srt 369 Bytes
==查看完整文档列表==