Torrent Info
Title CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam
Category
Size 11.68GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 687B
001 Active Reconnaissance (OBJ 2.2 and 2.3)_en.srt 4.68KB
001 Active Reconnaissance (OBJ 2.2 and 2.3).mp4 10.24MB
001 Analyzing Scripts (OBJ 5.2)_en.srt 10.61KB
001 Analyzing Scripts (OBJ 5.2).mp4 31.27MB
001 Application Attacks (OBJ 3.3)_en.srt 5.96KB
001 Application Attacks (OBJ 3.3).mp4 11.82MB
001 Application Vulnerabilities (OBJ 3.3)_en.srt 11.98KB
001 Application Vulnerabilities (OBJ 3.3).mp4 31.99MB
001 Attacks on Mobile Devices (OBJ 3.5)_en.srt 10.24KB
001 Attacks on Mobile Devices (OBJ 3.5).mp4 28.24MB
001 Attacks on Specialized Systems (OBJ 3.5)_en.srt 5.78KB
001 Attacks on Specialized Systems (OBJ 3.5).mp4 12.46MB
001 Cloud Attacks (OBJ 3.4)_en.srt 4.31KB
001 Cloud Attacks (OBJ 3.4).mp4 6.53MB
001 Communication and Reports (OBJ 4.3)_en.srt 4.29KB
001 Communication and Reports (OBJ 4.3).mp4 5.39MB
001 Conclusion_en.srt 25.26KB
001 Conclusion.mp4 136.30MB
001 Detection Avoidance (OBJ 3.7)_en.srt 3.07KB
001 Detection Avoidance (OBJ 3.7).mp4 4.75MB
001 Exploits and Automation (OBJ 5.2)_en.srt 3.86KB
001 Exploits and Automation (OBJ 5.2).mp4 9.36MB
001 Findings and Remediations (OBJ 4.2)_en.srt 5.33KB
001 Findings and Remediations (OBJ 4.2).mp4 11.16MB
001 Network Attacks (OBJ 3.1)_en.srt 5.25KB
001 Network Attacks (OBJ 3.1).mp4 29.03MB
001 Nmap (OBJ 2.3 and 2.4)_en.srt 5.47KB
001 Nmap (OBJ 2.3 and 2.4).mp4 7.67MB
001 Passive Reconnaissance (OBJ 2.1)_en.srt 5.99KB
001 Passive Reconnaissance (OBJ 2.1).mp4 30.39MB
001 Planning an Engagement (OBJ 1.1, 1.2, and 1.3)_en.srt 5.49KB
001 Planning an Engagement (OBJ 1.1, 1.2, and 1.3).mp4 10.38MB
001 Post-exploitation (OBJ 3.7)_en.srt 6.13KB
001 Post-exploitation (OBJ 3.7).mp4 8.52MB
001 Post-report Activities (OBJ 4.2)_en.srt 5.83KB
001 Post-report Activities (OBJ 4.2).mp4 12.01MB
001 Scoping an Engagement (OBJ 1.1, 1.2, and 1.3)_en.srt 7.85KB
001 Scoping an Engagement (OBJ 1.1, 1.2, and 1.3).mp4 10.49MB
001 Scripting Basics (OBJ 5.1 & OBJ 5.2)_en.srt 4.76KB
001 Scripting Basics (OBJ 5.1 & OBJ 5.2).mp4 7.20MB
001 Social Engineering and Physical Attacks (OBJ 3.6)_en.srt 7.58KB
001 Social Engineering and Physical Attacks (OBJ 3.6).mp4 20.74MB
001 Tool Round-up (OBJ 5.3)_en.srt 6.51KB
001 Tool Round-up (OBJ 5.3).mp4 12.71MB
001 Vulnerability Scanning (OBJ 2.3 and 2.4)_en.srt 4.19KB
001 Vulnerability Scanning (OBJ 2.3 and 2.4).mp4 8.64MB
001 Welcome_en.srt 26.76KB
001 Welcome.mp4 273.16MB
001 Wireless Attacks (OBJ 3.2)_en.srt 7.37KB
001 Wireless Attacks (OBJ 3.2).mp4 15.28MB
002 Attacking the Cloud (OBJ 3.4)_en.srt 13.48KB
002 Attacking the Cloud (OBJ 3.4).mp4 24.39MB
002 BONUS Where to go from here_en.srt 8.73KB
002 BONUS Where to go from here.mp4 12.51MB
002 Coding in Bash (OBJ 5.2)_en.srt 36.15KB
002 Coding in Bash (OBJ 5.2).mp4 79.42MB
002 Communication Paths (OBJ 4.3)_en.srt 12.62KB
002 Communication Paths (OBJ 4.3).mp4 35.25MB
002 CompTIA-PenTest-PT0-002-Study-Notes.pdf 6.48MB
002 Defining the Scope (OBJ 1.2)_en.srt 14.70KB
002 Defining the Scope (OBJ 1.2).mp4 62.01MB
002 Directory Traversals (OBJ 3.3)_en.srt 18.39KB
002 Directory Traversals (OBJ 3.3).mp4 67.02MB
002 Download Your Free Study Guide.html 75B
002 Enterprise Mobility Management (OBJ 3.5)_en.srt 20.09KB
002 Enterprise Mobility Management (OBJ 3.5).mp4 62.11MB
002 Enumerating the Network (OBJ 3.7)_en.srt 8.58KB
002 Enumerating the Network (OBJ 3.7).mp4 24.77MB
002 Exploits to Download Files (OBJ 5.2)_en.srt 8.36KB
002 Exploits to Download Files (OBJ 5.2).mp4 14.55MB
002 Information Gathering (OBJ 2.1)_en.srt 12.58KB
002 Information Gathering (OBJ 2.1).mp4 40.66MB
002 Internet of Things (IoT) Devices (OBJ 3.5)_en.srt 16.16KB
002 Internet of Things (IoT) Devices (OBJ 3.5).mp4 85.22MB
002 Methods of Influence (OBJ 3.6)_en.srt 26.22KB
002 Methods of Influence (OBJ 3.6).mp4 97.99MB
002 Nmap Discovery Scans (OBJ 2.3 and 2.4)_en.srt 15.98KB
002 Nmap Discovery Scans (OBJ 2.3 and 2.4).mp4 44.11MB
002 OSINT Tools (OBJ 5.3)_en.srt 11.84KB
002 OSINT Tools (OBJ 5.3).mp4 35.94MB
002 PenTest-PT0-002-Objectives.pdf 151.46KB
002 Race Conditions (OBJ 3.3)_en.srt 11.13KB
002 Race Conditions (OBJ 3.3).mp4 27.91MB
002 Removing Shells and Tools (OBJ 4.2)_en.srt 5.94KB
002 Removing Shells and Tools (OBJ 4.2).mp4 14.32MB
002 Risk (OBJ 1.2)_en.srt 19.74KB
002 Risk (OBJ 1.2).mp4 92.74MB
002 Scanning and Enumeration (OBJ 2.2 and 2.3)_en.srt 20.68KB
002 Scanning and Enumeration (OBJ 2.2 and 2.3).mp4 43.71MB
002 Scripting Tools (OBJ 5.2)_en.srt 20.67KB
002 Scripting Tools (OBJ 5.2).mp4 49.38MB
002 Security Control Categories (OBJ 4.2)_en.srt 28.20KB
002 Security Control Categories (OBJ 4.2).mp4 108.84MB
002 Stress Testing (OBJ 3.1)_en.srt 13.11KB
002 Stress Testing (OBJ 3.1).mp4 32.37MB
002 Trojans and Backdoors (OBJ 3.7)_en.srt 9.40KB
002 Trojans and Backdoors (OBJ 3.7).mp4 26.61MB
002 Vulnerability Lifecycle (OBJ 2.3 and 2.4)_en.srt 18.37KB
002 Vulnerability Lifecycle (OBJ 2.3 and 2.4).mp4 48.50MB
002 Wireless Security (OBJ 3.2)_en.srt 32.86KB
002 Wireless Security (OBJ 3.2).mp4 54.45MB
003 Adversary Emulation (OBJ 1.2)_en.srt 25.00KB
003 Adversary Emulation (OBJ 1.2).mp4 116.03MB
003 Bash Example (OBJ 5.2)_en.srt 8.71KB
003 Bash Example (OBJ 5.2).mp4 18.58MB
003 Buffer Overflows (OBJ 3.3)_en.srt 25.91KB
003 Buffer Overflows (OBJ 3.3).mp4 53.88MB
003 Bypassing MAC Filtering (OBJ 3.2)_en.srt 7.34KB
003 Bypassing MAC Filtering (OBJ 3.2).mp4 19.99MB
003 Communication Triggers (OBJ 4.3)_en.srt 9.98KB
003 Communication Triggers (OBJ 4.3).mp4 30.87MB
003 Conducting Enumeration (OBJ 2.3)_en.srt 30.03KB
003 Conducting Enumeration (OBJ 2.3).mp4 124.42MB
003 Creating Persistence (OBJ 3.7)_en.srt 25.65KB
003 Creating Persistence (OBJ 3.7).mp4 55.94MB
003 Credential Harvesting (OBJ 3.4)_en.srt 16.56KB
003 Credential Harvesting (OBJ 3.4).mp4 41.31MB
003 Deleting Test Credentials (OBJ 4.2)_en.srt 4.45KB
003 Deleting Test Credentials (OBJ 4.2).mp4 9.61MB
003 Deployment Options (OBJ 3.5)_en.srt 9.59KB
003 Deployment Options (OBJ 3.5).mp4 29.09MB
003 Dirbuster (OBJ 3.3)_en.srt 14.88KB
003 Dirbuster (OBJ 3.3).mp4 25.90MB
003 Exam Tips_en.srt 8.66KB
003 Exam Tips.mp4 11.29MB
003 Exploit Resources (OBJ 3.1)_en.srt 12.26KB
003 Exploit Resources (OBJ 3.1).mp4 43.20MB
003 Exploits for Remote Access (OBJ 5.2)_en.srt 17.02KB
003 Exploits for Remote Access (OBJ 5.2).mp4 35.13MB
003 Internet of Things (IoT) Vulnerabilities (OBJ 3.5)_en.srt 16.12KB
003 Internet of Things (IoT) Vulnerabilities (OBJ 3.5).mp4 44.15MB
003 Network Segmentation Testing (OBJ 3.7)_en.srt 5.98KB
003 Network Segmentation Testing (OBJ 3.7).mp4 23.99MB
003 Nmap Port Scans (OBJ 2.3 and 2.4)_en.srt 19.96KB
003 Nmap Port Scans (OBJ 2.3 and 2.4).mp4 27.56MB
003 Open-Source Intelligence (OSINT) (OBJ 2.1)_en.srt 15.44KB
003 Open-Source Intelligence (OSINT) (OBJ 2.1).mp4 47.01MB
003 Risk Handling (OBJ 1.2)_en.srt 16.22KB
003 Risk Handling (OBJ 1.2).mp4 71.07MB
003 Scanning Tools (OBJ 5.3)_en.srt 11.94KB
003 Scanning Tools (OBJ 5.3).mp4 38.28MB
003 Selecting Security Controls (OBJ 4.2)_en.srt 10.25KB
003 Selecting Security Controls (OBJ 4.2).mp4 38.19MB
003 Social Engineering (OBJ 3.6)_en.srt 30.86KB
003 Social Engineering (OBJ 3.6).mp4 114.35MB
003 Variables (OBJ 5.1)_en.srt 14.61KB
003 Variables (OBJ 5.1).mp4 41.30MB
003 Vulnerability Scans (OBJ 2.3 and 2.4)_en.srt 24.04KB
003 Vulnerability Scans (OBJ 2.3 and 2.4).mp4 67.10MB
004 ARP Poisoning (OBJ 3.1)_en.srt 14.56KB
004 ARP Poisoning (OBJ 3.1).mp4 28.58MB
004 Buffer Overflow Attacks (OBJ 3.3)_en.srt 11.38KB
004 Buffer Overflow Attacks (OBJ 3.3).mp4 27.42MB
004 Coding in PowerShell (OBJ 5.2)_en.srt 28.15KB
004 Coding in PowerShell (OBJ 5.2).mp4 74.70MB
004 Controls (OBJ 1.2)_en.srt 15.01KB
004 Controls (OBJ 1.2).mp4 57.00MB
004 Cross-Site Scripting (XSS) (OBJ 3.3)_en.srt 19.35KB
004 Cross-Site Scripting (XSS) (OBJ 3.3).mp4 25.83MB
004 Destroy Test Data (OBJ 4.2)_en.srt 5.67KB
004 Destroy Test Data (OBJ 4.2).mp4 9.34MB
004 Embedded Systems (OBJ 3.5)_en.srt 15.41KB
004 Embedded Systems (OBJ 3.5).mp4 22.01MB
004 Exploits for Enumerating Users (OBJ 5.2)_en.srt 11.45KB
004 Exploits for Enumerating Users (OBJ 5.2).mp4 16.94MB
004 Lateral Movement and Pivoting (OBJ 3.7)_en.srt 6.86KB
004 Lateral Movement and Pivoting (OBJ 3.7).mp4 12.91MB
004 Living Off the Land (OBJ 3.7)_en.srt 25.87KB
004 Living Off the Land (OBJ 3.7).mp4 66.63MB
004 Loops (OBJ 5.1)_en.srt 10.10KB
004 Loops (OBJ 5.1).mp4 10.64MB
004 Misconfigured Assets (OBJ 3.4)_en.srt 24.73KB
004 Misconfigured Assets (OBJ 3.4).mp4 59.70MB
004 Mobile Reconnaissance Concerns (OBJ 3.5)_en.srt 17.52KB
004 Mobile Reconnaissance Concerns (OBJ 3.5).mp4 69.36MB
004 Networking Tools (OBJ 5.3)_en.srt 4.84KB
004 Networking Tools (OBJ 5.3).mp4 15.83MB
004 Nmap Fingerprinting (OBJ 2.3 and 2.4)_en.srt 9.80KB
004 Nmap Fingerprinting (OBJ 2.3 and 2.4).mp4 24.45MB
004 Other Enumeration (OBJ 2.2 and 2.3)_en.srt 20.69KB
004 Other Enumeration (OBJ 2.2 and 2.3).mp4 26.98MB
004 Phishing Campaigns (OBJ 3.6)_en.srt 11.02KB
004 Phishing Campaigns (OBJ 3.6).mp4 24.06MB
004 Physical Controls (OBJ 4.2)_en.srt 16.00KB
004 Physical Controls (OBJ 4.2).mp4 83.26MB
004 Reasons for Communication (OBJ 4.3)_en.srt 23.28KB
004 Reasons for Communication (OBJ 4.3).mp4 60.69MB
004 Scanning Considerations (OBJ 2.3 and 2.4)_en.srt 20.22KB
004 Scanning Considerations (OBJ 2.3 and 2.4).mp4 75.29MB
004 Signal Exploitation (OBJ 3.2)_en.srt 26.14KB
004 Signal Exploitation (OBJ 3.2).mp4 54.64MB
004 Social Media Scraping (OBJ 2.1)_en.srt 23.91KB
004 Social Media Scraping (OBJ 2.1).mp4 68.67MB
004 Target List (OBJ 1.2)_en.srt 23.70KB
004 Target List (OBJ 1.2).mp4 79.32MB
005 Authentication and References (OBJ 3.3)_en.srt 11.95KB
005 Authentication and References (OBJ 3.3).mp4 45.10MB
005 Client Acceptance (OBJ 4.2)_en.srt 6.25KB
005 Client Acceptance (OBJ 4.2).mp4 23.32MB
005 Cross-Site Request Forgery (CSRF) (OBJ 3.3)_en.srt 15.90KB
005 Cross-Site Request Forgery (CSRF) (OBJ 3.3).mp4 37.37MB
005 Data Exfiltration (OBJ 3.7)_en.srt 14.10KB
005 Data Exfiltration (OBJ 3.7).mp4 38.42MB
005 DNS Cache Poisoning (OBJ 3.1)_en.srt 24.72KB
005 DNS Cache Poisoning (OBJ 3.1).mp4 28.34MB
005 Exploits for Enumerating Assets (OBJ 5.2)_en.srt 9.35KB
005 Exploits for Enumerating Assets (OBJ 5.2).mp4 17.03MB
005 ICS and SCADA Devices (OBJ 3.5)_en.srt 21.08KB
005 ICS and SCADA Devices (OBJ 3.5).mp4 59.87MB
005 Identifying Restrictions (OBJ 1.1)_en.srt 17.78KB
005 Identifying Restrictions (OBJ 1.1).mp4 81.25MB
005 Logic Control (OBJ 5.1)_en.srt 8.48KB
005 Logic Control (OBJ 5.1).mp4 13.28MB
005 Metadata Service Attack (OBJ 3.4)_en.srt 11.29KB
005 Metadata Service Attack (OBJ 3.4).mp4 23.66MB
005 Mobile Device Insecurity (OBJ 3.5)_en.srt 26.92KB
005 Mobile Device Insecurity (OBJ 3.5).mp4 115.78MB
005 Nessus Scanning (OBJ 2.3 and 2.4)_en.srt 18.51KB
005 Nessus Scanning (OBJ 2.3 and 2.4).mp4 73.92MB
005 Operational Controls (OBJ 4.2)_en.srt 24.87KB
005 Operational Controls (OBJ 4.2).mp4 68.69MB
005 OSINT Tools (OBJ 2.1)_en.srt 24.20KB
005 OSINT Tools (OBJ 2.1).mp4 61.40MB
005 Pass the Hash (OBJ 3.7)_en.srt 16.66KB
005 Pass the Hash (OBJ 3.7).mp4 39.43MB
005 PenTest Methodologies (OBJ 1.2)_en.srt 15.82KB
005 PenTest Methodologies (OBJ 1.2).mp4 27.15MB
005 PowerShell Example (OBJ 5.2)_en.srt 6.45KB
005 PowerShell Example (OBJ 5.2).mp4 26.58MB
005 Presentation of Findings (4.1 & OBJ 4.3)_en.srt 13.73KB
005 Presentation of Findings (4.1 & OBJ 4.3).mp4 65.26MB
005 Social Engineering Toolkit (OBJ 3.6)_en.srt 28.48KB
005 Social Engineering Toolkit (OBJ 3.6).mp4 104.09MB
005 Using Nmap (OBJ 2.3 and 2.4)_en.srt 20.98KB
005 Using Nmap (OBJ 2.3 and 2.4).mp4 86.37MB
005 Website Reconnaissance (OBJ 2.3)_en.srt 22.32KB
005 Website Reconnaissance (OBJ 2.3).mp4 49.57MB
005 WEP Hacking (OBJ 3.2)_en.srt 17.56KB
005 WEP Hacking (OBJ 3.2).mp4 42.01MB
005 Wireless Tools (OBJ 5.3)_en.srt 14.33KB
005 Wireless Tools (OBJ 5.3).mp4 49.72MB
006 Administrative Controls (OBJ 4.2)_en.srt 31.23KB
006 Administrative Controls (OBJ 4.2).mp4 71.70MB
006 Attestation of Findings (OBJ 4.2)_en.srt 6.28KB
006 Attestation of Findings (OBJ 4.2).mp4 25.31MB
006 Automation in Engagements (OBJ 5.2)_en.srt 7.07KB
006 Automation in Engagements (OBJ 5.2).mp4 21.17MB
006 Coding in Python (OBJ 5.2)_en.srt 39.29KB
006 Coding in Python (OBJ 5.2).mp4 71.71MB
006 Covert Channels (OBJ 3.7)_en.srt 10.37KB
006 Covert Channels (OBJ 3.7).mp4 13.60MB
006 Data Structures (OBJ 5.1)_en.srt 22.44KB
006 Data Structures (OBJ 5.1).mp4 31.17MB
006 Detecting and Evading Defenses (OBJ 2.2)_en.srt 20.72KB
006 Detecting and Evading Defenses (OBJ 2.2).mp4 50.06MB
006 Golden Ticket (OBJ 3.7)_en.srt 11.92KB
006 Golden Ticket (OBJ 3.7).mp4 17.34MB
006 ICS Protocols and Vulnerabilities (OBJ 3.5)_en.srt 24.63KB
006 ICS Protocols and Vulnerabilities (OBJ 3.5).mp4 106.06MB
006 Improper Error Handling (OBJ 3.3)_en.srt 11.77KB
006 Improper Error Handling (OBJ 3.3).mp4 13.32MB
006 LLMNRNBT-NS Poisoning (OBJ 3.1)_en.srt 8.50KB
006 LLMNRNBT-NS Poisoning (OBJ 3.1).mp4 23.01MB
006 Multifactor Authentication (OBJ 3.5)_en.srt 26.89KB
006 Multifactor Authentication (OBJ 3.5).mp4 110.92MB
006 Nmap Scripting Engine (OBJ 2.3 and 2.4)_en.srt 38.38KB
006 Nmap Scripting Engine (OBJ 2.3 and 2.4).mp4 170.28MB
006 OpenVas Scanning (OBJ 2.3 and 2.4)_en.srt 28.76KB
006 OpenVas Scanning (OBJ 2.3 and 2.4).mp4 77.08MB
006 PenTest Standards (OBJ 1.2)_en.srt 13.83KB
006 PenTest Standards (OBJ 1.2).mp4 38.41MB
006 Pretexting (OBJ 3.6)_en.srt 9.81KB
006 Pretexting (OBJ 3.6).mp4 47.79MB
006 Report Data Gathering (OBJ 4.1)_en.srt 7.60KB
006 Report Data Gathering (OBJ 4.1).mp4 16.02MB
006 Rules of Engagement (OBJ 1.2)_en.srt 17.04KB
006 Rules of Engagement (OBJ 1.2).mp4 82.72MB
006 Social Engineering Tools (OBJ 5.3)_en.srt 5.13KB
006 Social Engineering Tools (OBJ 5.3).mp4 14.51MB
006 Software Development Kit (SDK) (OBJ 3.4)_en.srt 5.61KB
006 Software Development Kit (SDK) (OBJ 3.4).mp4 8.27MB
006 SQL Injections (OBJ 3.3)_en.srt 14.97KB
006 SQL Injections (OBJ 3.3).mp4 19.03MB
006 Using OSINT Tools (OBJ 2.1)_en.srt 57.36KB
006 Using OSINT Tools (OBJ 2.1).mp4 170.22MB
006 WPAWPA2 Hacking (OBJ 3.2)_en.srt 16.72KB
006 WPAWPA2 Hacking (OBJ 3.2).mp4 31.00MB
007 Assessment Types (OBJ 1.3)_en.srt 19.84KB
007 Assessment Types (OBJ 1.3).mp4 49.11MB
007 Auditing the Cloud (OBJ 3.4)_en.srt 9.45KB
007 Auditing the Cloud (OBJ 3.4).mp4 25.59MB
007 Automation with Nmap Scripts (OBJ 5.2)_en.srt 5.11KB
007 Automation with Nmap Scripts (OBJ 5.2).mp4 12.89MB
007 Baiting Victims (OBJ 3.6)_en.srt 16.48KB
007 Baiting Victims (OBJ 3.6).mp4 51.89MB
007 Conducting SQL Injections (OBJ 3.3)_en.srt 18.08KB
007 Conducting SQL Injections (OBJ 3.3).mp4 35.93MB
007 Data Storage Vulnerabilities (OBJ 3.5)_en.srt 12.22KB
007 Data Storage Vulnerabilities (OBJ 3.5).mp4 42.79MB
007 DNS Information (OBJ 2.1)_en.srt 22.35KB
007 DNS Information (OBJ 2.1).mp4 58.05MB
007 Improper Headers (OBJ 3.3)_en.srt 12.85KB
007 Improper Headers (OBJ 3.3).mp4 21.63MB
007 Lateral Movement (OBJ 3.7)_en.srt 17.55KB
007 Lateral Movement (OBJ 3.7).mp4 69.30MB
007 Lessons Learned (OBJ 4.2)_en.srt 8.68KB
007 Lessons Learned (OBJ 4.2).mp4 28.90MB
007 MAC Spoofing (OBJ 3.1)_en.srt 10.63KB
007 MAC Spoofing (OBJ 3.1).mp4 30.71MB
007 Mobile Device Attacks (OBJ 3.5)_en.srt 10.33KB
007 Mobile Device Attacks (OBJ 3.5).mp4 21.49MB
007 Nikto Scanning (OBJ 2.3 and 2.4)_en.srt 10.49KB
007 Nikto Scanning (OBJ 2.3 and 2.4).mp4 64.58MB
007 Object Oriented Programming (OBJ 5.1)_en.srt 13.71KB
007 Object Oriented Programming (OBJ 5.1).mp4 25.08MB
007 Packet Crafting (OBJ 2.2)_en.srt 21.45KB
007 Packet Crafting (OBJ 2.2).mp4 59.58MB
007 Planning a Test (OBJ 1.2)_en.srt 20.26KB
007 Planning a Test (OBJ 1.2).mp4 66.62MB
007 Python Example (OBJ 5.2)_en.srt 7.91KB
007 Python Example (OBJ 5.2).mp4 15.80MB
007 Remote Access Tools (OBJ 5.3)_en.srt 8.10KB
007 Remote Access Tools (OBJ 5.3).mp4 24.24MB
007 Steganography (3.7)_en.srt 14.10KB
007 Steganography (3.7).mp4 15.25MB
007 System Hardening (OBJ 4.2)_en.srt 25.96KB
007 System Hardening (OBJ 4.2).mp4 31.29MB
007 WPS PIN Attacks (OBJ 3.2)_en.srt 22.67KB
007 WPS PIN Attacks (OBJ 3.2).mp4 80.68MB
007 Written Reports (OBJ 4.1)_en.srt 31.04KB
007 Written Reports (OBJ 4.1).mp4 118.80MB
008 Burp Suite and SQLmap (OBJ 3.3)_en.srt 20.01KB
008 Burp Suite and SQLmap (OBJ 3.3).mp4 98.16MB
008 Code Signing (OBJ 3.3)_en.srt 4.25KB
008 Code Signing (OBJ 3.3).mp4 14.98MB
008 Coding in Perl (OBJ 5.2)_en.srt 31.21KB
008 Coding in Perl (OBJ 5.2).mp4 64.19MB
008 Common Themes (OBJ 4.1)_en.srt 6.15KB
008 Common Themes (OBJ 4.1).mp4 8.65MB
008 Conducting Cloud Audits (OBJ 3.4)_en.srt 28.01KB
008 Conducting Cloud Audits (OBJ 3.4).mp4 105.08MB
008 Covering Your Tracks (OBJ 3.7)_en.srt 19.68KB
008 Covering Your Tracks (OBJ 3.7).mp4 30.32MB
008 Credential Testing Tools (OBJ 5.3)_en.srt 14.51KB
008 Credential Testing Tools (OBJ 5.3).mp4 46.62MB
008 Eavesdropping (OBJ 2.2)_en.srt 22.34KB
008 Eavesdropping (OBJ 2.2).mp4 103.08MB
008 Evil Twins (OBJ 3.2)_en.srt 13.06KB
008 Evil Twins (OBJ 3.2).mp4 30.62MB
008 Impersonation (OBJ 3.6)_en.srt 9.81KB
008 Impersonation (OBJ 3.6).mp4 39.84MB
008 Legal Concepts (OBJ 1.1)_en.srt 17.39KB
008 Legal Concepts (OBJ 1.1).mp4 58.63MB
008 Malware Analysis (OBJ 3.5)_en.srt 31.90KB
008 Malware Analysis (OBJ 3.5).mp4 85.98MB
008 Pivoting (3.7)_en.srt 15.73KB
008 Pivoting (3.7).mp4 34.45MB
008 Reconnaissance with CentralOps (OBJ 2.1)_en.srt 26.16KB
008 Reconnaissance with CentralOps (OBJ 2.1).mp4 105.37MB
008 Retesting (OBJ 4.2)_en.srt 5.46KB
008 Retesting (OBJ 4.2).mp4 9.82MB
008 Secure Coding (OBJ 4.2)_en.srt 20.45KB
008 Secure Coding (OBJ 4.2).mp4 23.58MB
008 Validating the Scope (OBJ 1.2)_en.srt 10.89KB
008 Validating the Scope (OBJ 1.2).mp4 42.03MB
008 Virtual Environments (OBJ 3.5)_en.srt 16.95KB
008 Virtual Environments (OBJ 3.5).mp4 41.30MB
008 VLAN Hopping (OBJ 3.1)_en.srt 14.00KB
008 VLAN Hopping (OBJ 3.1).mp4 30.88MB
009 Conducting Malware Analysis (OBJ 3.5)_en.srt 46.84KB
009 Conducting Malware Analysis (OBJ 3.5).mp4 159.71MB
009 Escalating Privileges (OBJ 3.7)_en.srt 38.05KB
009 Escalating Privileges (OBJ 3.7).mp4 98.01MB
009 Implementing MFA (OBJ 4.2)_en.srt 14.74KB
009 Implementing MFA (OBJ 4.2).mp4 41.16MB
009 Limitations and Permission (OBJ 1.1 and 1.3)_en.srt 14.98KB
009 Limitations and Permission (OBJ 1.1 and 1.3).mp4 57.14MB
009 NAC Bypass (OBJ 3.1)_en.srt 9.96KB
009 NAC Bypass (OBJ 3.1).mp4 44.79MB
009 On-path and Relay Attacks (OBJ 3.2)_en.srt 9.78KB
009 On-path and Relay Attacks (OBJ 3.2).mp4 10.63MB
009 OWASP ZAP (OBJ 3.3)_en.srt 6.05KB
009 OWASP ZAP (OBJ 3.3).mp4 21.18MB
009 Perl Example (OBJ 5.2)_en.srt 29.53KB
009 Perl Example (OBJ 5.2).mp4 108.11MB
009 Persistence and Covering Your Tracks (OBJ 3.7)_en.srt 17.57KB
009 Persistence and Covering Your Tracks (OBJ 3.7).mp4 69.94MB
009 Physical Security (OBJ 3.6)_en.srt 35.79KB
009 Physical Security (OBJ 3.6).mp4 199.42MB
009 Public Repositories (OBJ2.1)_en.srt 11.41KB
009 Public Repositories (OBJ2.1).mp4 32.68MB
009 Regulatory Compliance (OBJ 1.1)_en.srt 30.75KB
009 Regulatory Compliance (OBJ 1.1).mp4 104.53MB
009 Securing and Storing Reports (OBJ 4.1)_en.srt 10.39KB
009 Securing and Storing Reports (OBJ 4.1).mp4 21.29MB
009 Virtual Machine Attacks (OBJ 3.5)_en.srt 13.40KB
009 Virtual Machine Attacks (OBJ 3.5).mp4 37.50MB
009 Vulnerable Components (OBJ 3.3)_en.srt 23.76KB
009 Vulnerable Components (OBJ 3.3).mp4 101.72MB
009 Wardriving (OBJ 2.2)_en.srt 17.06KB
009 Wardriving (OBJ 2.2).mp4 81.21MB
009 Web Application Tools (OBJ 5.3)_en.srt 4.37KB
009 Web Application Tools (OBJ 5.3).mp4 16.23MB
010 Bluetooth Attacks (OBJ 3.2)_en.srt 11.96KB
010 Bluetooth Attacks (OBJ 3.2).mp4 43.52MB
010 Build a Virtual Lab_en.srt 35.77KB
010 Build a Virtual Lab.mp4 101.61MB
010 Cloud Tools (OBJ 5.3)_en.srt 5.76KB
010 Cloud Tools (OBJ 5.3).mp4 11.67MB
010 Coding in JavaScript (OBJ 5.2)_en.srt 32.37KB
010 Coding in JavaScript (OBJ 5.2).mp4 95.41MB
010 Containerization (OBJ 3.5)_en.srt 12.55KB
010 Containerization (OBJ 3.5).mp4 38.78MB
010 Digital Certificates (OBJ 4.2)_en.srt 21.68KB
010 Digital Certificates (OBJ 4.2).mp4 55.48MB
010 DNS and ARP Analysis (OBJ 2.3)_en.srt 50.96KB
010 DNS and ARP Analysis (OBJ 2.3).mp4 63.15MB
010 Lock Picking (OBJ 3.6)_en.srt 3.21KB
010 Lock Picking (OBJ 3.6).mp4 9.71MB
010 Mobile Device Tools (OBJ 3.5)_en.srt 15.41KB
010 Mobile Device Tools (OBJ 3.5).mp4 19.30MB
010 On-path Attack (OBJ 3.1)_en.srt 7.79KB
010 On-path Attack (OBJ 3.1).mp4 12.22MB
010 Post-Exploitation Tools (OBJ 3.7)_en.srt 5.67KB
010 Post-Exploitation Tools (OBJ 3.7).mp4 8.02MB
010 Professionalism (OBJ 1.3)_en.srt 22.53KB
010 Professionalism (OBJ 1.3).mp4 67.46MB
010 Search Engine Analysis (OBJ 2.1)_en.srt 12.81KB
010 Search Engine Analysis (OBJ 2.1).mp4 15.96MB
010 Software Composition (OBJ 3.3)_en.srt 20.88KB
010 Software Composition (OBJ 3.3).mp4 78.95MB
010 Upgrading Restrictive Shells (OBJ 3.7)_en.srt 10.92KB
010 Upgrading Restrictive Shells (OBJ 3.7).mp4 27.12MB
010 XML Injections (OBJ 3.3)_en.srt 12.95KB
010 XML Injections (OBJ 3.3).mp4 23.65MB
011 JavaScript Example (OBJ 5.2)_en.srt 18.83KB
011 JavaScript Example (OBJ 5.2).mp4 44.04MB
011 Network Traffic Analysis (OBJ 2.3)_en.srt 35.24KB
011 Network Traffic Analysis (OBJ 2.3).mp4 170.55MB
011 Other Injection Attacks (OBJ 3.3)_en.srt 8.74KB
011 Other Injection Attacks (OBJ 3.3).mp4 9.71MB
011 Other Technical Controls (OBJ 4.2)_en.srt 5.41KB
011 Other Technical Controls (OBJ 4.2).mp4 9.66MB
011 Password Attacks (OBJ 3.1)_en.srt 20.10KB
011 Password Attacks (OBJ 3.1).mp4 81.76MB
011 Physical Attacks (OBJ 3.6)_en.srt 23.88KB
011 Physical Attacks (OBJ 3.6).mp4 29.50MB
011 Privilege Escalation (OBJ 3.3)_en.srt 13.63KB
011 Privilege Escalation (OBJ 3.3).mp4 15.02MB
011 RFID and NFC Attacks (OBJ 3.2)_en.srt 9.78KB
011 RFID and NFC Attacks (OBJ 3.2).mp4 36.23MB
011 Steganography Tools (OBJ 5.3)_en.srt 16.07KB
011 Steganography Tools (OBJ 5.3).mp4 50.82MB
011 URL Analysis (OBJ 2.1)_en.srt 31.90KB
011 URL Analysis (OBJ 2.1).mp4 96.21MB
012 Attacking Web Applications (OBJ 3.3)_en.srt 32.64KB
012 Attacking Web Applications (OBJ 3.3).mp4 129.88MB
012 Coding in Ruby (OBJ 5.2)_en.srt 27.24KB
012 Coding in Ruby (OBJ 5.2).mp4 49.57MB
012 Conducting Privilege Escalation (OBJ 3.3)_en.srt 25.64KB
012 Conducting Privilege Escalation (OBJ 3.3).mp4 188.29MB
012 Cryptographic Flaws (OBJ 2.1)_en.srt 34.35KB
012 Cryptographic Flaws (OBJ 2.1).mp4 62.81MB
012 Debuggers (OBJ 5.3)_en.srt 9.95KB
012 Debuggers (OBJ 5.3).mp4 44.02MB
012 Mitigation Strategies (OBJ 4.2)_en.srt 17.62KB
012 Mitigation Strategies (OBJ 4.2).mp4 96.04MB
012 Pass the Hash (OBJ 3.1)_en.srt 16.21KB
012 Pass the Hash (OBJ 3.1).mp4 32.67MB
012 Social Engineering Tools (OBJ 3.6)_en.srt 8.72KB
012 Social Engineering Tools (OBJ 3.6).mp4 34.73MB
013 CWE & CVE (OBJ 2.1)_en.srt 11.86KB
013 CWE & CVE (OBJ 2.1).mp4 37.30MB
013 Intro to Metasploit (OBJ 3.1)_en.srt 35.20KB
013 Intro to Metasploit (OBJ 3.1).mp4 115.40MB
013 Miscellaneous Tools (OBJ 5.3)_en.srt 17.58KB
013 Miscellaneous Tools (OBJ 5.3).mp4 59.17MB
013 Ruby Example (OBJ 5.2)_en.srt 8.17KB
013 Ruby Example (OBJ 5.2).mp4 19.04MB
014 Netcat (OBJ 3.1)_en.srt 15.32KB
014 Netcat (OBJ 3.1).mp4 18.61MB
015 Using Netcat (OBJ 3.1)_en.srt 21.35KB
015 Using Netcat (OBJ 3.1).mp4 22.09MB
1 45B
10 1.20MB
100 1.96MB
101 1.98MB
102 296.47KB
103 492.00KB
104 821.52KB
105 1.21MB
106 1.97MB
107 1.99MB
108 702.09KB
109 712.60KB
11 1.97MB
110 721.12KB
111 855.76KB
112 1.34MB
113 161.57KB
114 588.46KB
115 1.22MB
116 1.58MB
117 1.59MB
118 1.72MB
119 1.81MB
12 223.31KB
120 509.64KB
121 647.40KB
122 715.61KB
123 1.77MB
124 64.24KB
125 66.65KB
126 766.13KB
127 886.36KB
128 1.27MB
129 1.55MB
13 614.99KB
130 1.32MB
131 1.33MB
132 1.63MB
133 9.70KB
134 722.13KB
135 745.72KB
136 851.19KB
137 1019.63KB
138 1.12MB
139 1.13MB
14 1.65MB
140 1.29MB
141 1.38MB
142 1.61MB
143 1.68MB
144 507.13KB
145 934.42KB
146 988.58KB
147 1.10MB
148 1.42MB
149 1.66MB
15 1.08MB
150 1.76MB
151 92.72KB
152 452.35KB
153 598.14KB
154 870.63KB
155 902.76KB
156 1.02MB
157 1.39MB
158 1.42MB
159 98.94KB
16 1.16MB
160 178.33KB
161 419.11KB
162 706.02KB
163 941.32KB
164 1.23MB
165 1.55MB
166 1.61MB
167 1.76MB
168 1.94MB
169 12.34KB
17 1.89MB
170 343.11KB
171 356.00KB
172 434.13KB
173 696.20KB
174 1017.20KB
175 1.91MB
176 1.99MB
177 380.76KB
178 520.91KB
179 728.93KB
18 1.94MB
180 837.20KB
181 845.46KB
182 1.26MB
183 14.47KB
184 721.19KB
185 985.89KB
186 997.02KB
187 1.39MB
188 1.42MB
189 674.67KB
19 647.87KB
190 991.14KB
191 1.06MB
192 1.77MB
193 1.98MB
194 43.69KB
195 169.33KB
196 206.56KB
197 734.11KB
198 771.33KB
199 998.91KB
2 149B
20 941.30KB
200 1.02MB
201 1.45MB
202 1.49MB
203 1.68MB
204 405.16KB
205 694.81KB
206 738.50KB
207 1.09MB
208 1.11MB
209 1.29MB
21 1.47MB
210 1.49MB
211 1.54MB
212 1.78MB
213 1.99MB
214 184.31KB
215 335.50KB
216 732.08KB
217 863.42KB
218 1.36MB
219 1.37MB
22 1.91MB
220 1.51MB
221 1.62MB
222 1.76MB
223 187.84KB
224 294.52KB
225 295.13KB
226 347.04KB
227 400.13KB
228 652.28KB
229 671.65KB
23 937.74KB
230 1.35MB
231 1.36MB
232 1.48MB
233 1.73MB
234 1.98MB
235 333.28KB
236 822.05KB
237 1.47MB
238 1.52MB
239 626.87KB
24 283.20KB
25 394.31KB
26 1.84MB
27 1.99MB
28 7.59KB
29 1.79MB
3 595.24KB
30 1.96MB
31 604.31KB
32 1.26MB
33 1.63MB
34 16.91KB
35 798.92KB
36 755.09KB
37 1.28MB
38 246.48KB
39 771.67KB
4 1.72MB
40 809.00KB
41 1.32MB
42 594.28KB
43 698.90KB
44 1.05MB
45 940.23KB
46 728.18KB
47 1.30MB
48 85.45KB
49 297.74KB
5 1.78MB
50 311.27KB
51 952.77KB
52 65.02KB
53 660.42KB
54 714.57KB
55 1.31MB
56 1.33MB
57 554.84KB
58 924.72KB
59 1001.89KB
6 299.06KB
60 1.37MB
61 1.38MB
62 758.23KB
63 1.42MB
64 1.81MB
65 868.78KB
66 1.19MB
67 1.89MB
68 1.99MB
69 618.86KB
7 1.70MB
70 1.31MB
71 134.85KB
72 310.08KB
73 433.29KB
74 845.19KB
75 1.37MB
76 1.95MB
77 878.76KB
78 1.00MB
79 57.54KB
8 127.57KB
80 535.49KB
81 1.36MB
82 1.55MB
83 126.13KB
84 108.88KB
85 1.18MB
86 1.94MB
87 286.09KB
88 439.08KB
89 443.50KB
9 1.58MB
90 638.67KB
91 913.01KB
92 1.50MB
93 213.67KB
94 1009.54KB
95 1.38MB
96 920.10KB
97 1.21MB
98 1.85MB
99 1.89MB
TutsNode.com.txt 63B
Distribution statistics by country
Spain (ES) 1
Tanzania (TZ) 1
Republic of Lithuania (LT) 1
Poland (PL) 1
Egypt (EG) 1
Pakistan (PK) 1
Australia (AU) 1
Brazil (BR) 1
Russia (RU) 1
United Kingdom (GB) 1
Israel (IL) 1
Republic of Korea (KR) 1
Serbia (RS) 1
Romania (RO) 1
Total 14
IP List List of IP addresses which were distributed this torrent