el-hacker.org Downloads
   
 Name                                                                                        Last modified      Size  
 Parent Directory                                                                                                 -   
 00001 Introduction.mp4                                                                      2024-01-31 12:40  246M  
 00002 Learning_objectives.mp4                                                               2024-01-31 12:41   58M  
 00003 1.1_Introducing_Ethical_Hacking_and_Pen_Testing.mp4                                   2024-01-31 12:41  216M  
 00004 1.2_Getting_Started_with_Ethical_Hacking_and_Pen_Testing.mp4                          2024-01-31 12:41  353M  
 00005 1.3_Understanding_the_Legal_Aspects_of_Penetration_Testing.mp4                        2024-01-31 12:42  134M  
 00006 1.4_Exploring_Penetration_Testing_Methodologies.mp4                                   2024-01-31 12:42   88M  
 00007 1.5_Exploring_Penetration_Testing_and_other_Cyber_Security_Certifications.mp4         2024-01-31 12:42  172M  
 00008 1.6_Building_Your_Own_Lab_-_Overview.mp4                                              2024-01-31 12:43  434M  
 00009 1.7_Building_Your_Own_Lab_-_VIRL_and_Operating_System_Software.mp4                    2024-01-31 12:43  264M  
 00010 1.8_Understanding_Vulnerabilities_Threats_and_Exploits.mp4                            2024-01-31 12:43   73M  
 00011 1.9_Understanding_the_Current_Threat_Landscape.mp4                                    2024-01-31 12:43   88M  
 00012 Learning_objectives.mp4                                                               2024-01-31 12:43   28M  
 00013 2.1_Installing_Kali.mp4                                                               2024-01-31 12:44  138M  
 00014 2.2_Examining_Kali_Modules_and_Architecture.mp4                                       2024-01-31 12:44  135M  
 00015 2.3_Managing_Kali_Services.mp4                                                        2024-01-31 12:44  132M  
 00016 Learning_objectives.mp4                                                               2024-01-31 12:44   26M  
 00017 3.1_Understanding_Passive_Reconnaissance.mp4                                          2024-01-31 12:44  270M  
 00018 3.2_Exploring_Passive_Reconnaissance_Methodologies_-_Discovering_Host.mp4             2024-01-31 12:45  268M  
 00019 3.3_Exploring_Passive_Reconnaissance_Methodologies_-_Searching_for_Files.mp4          2024-01-31 12:45  153M  
 00020 3.4_Exploring_Passive_Reconnaissance_Methodologies_-_Searching_for_Names.mp4          2024-01-31 12:45  107M  
 00021 3.5_Surveying_Essential_Tools_for_Passive_Reconnaissance_-_SpiderFoot.mp4             2024-01-31 12:46  179M  
 00022 3.6_Surveying_Essential_Tools_for_Passive_Reconnaissance_-_Recon-ng.mp4               2024-01-31 12:46  466M  
 00023 Learning_objectives.mp4                                                               2024-01-31 12:46   25M  
 00024 4.1_Understanding_Active_Reconnaissance.mp4                                           2024-01-31 12:47  134M  
 00025 4.2_Exploring_Active_Reconnaissance_Methodologies_from_an_Ethical_Hacker.mp4          2024-01-31 12:47   51M  
 00026 4.3_Surveying_Essential_Tools_for_Active_Reconnaissance_-_Port_Scanning.mp4           2024-01-31 12:47  264M  
 00027 4.4_Surveying_Essential_Tools_for_Active_Reconnaissance_-_Network_and_Web.mp4         2024-01-31 12:48  138M  
 00028 Learning_objectives.mp4                                                               2024-01-31 12:48   34M  
 00029 5.1_Understanding_Web_Applications.mp4                                                2024-01-31 12:48  166M  
 00030 5.2_Understanding_Web_Architectures.mp4                                               2024-01-31 12:48   56M  
 00031 5.3_Uncovering_Web_Vulnerabilities.mp4                                                2024-01-31 12:48  177M  
 00032 5.4_Testing_Web_Applications_-_Methodology.mp4                                        2024-01-31 12:48   18M  
 00033 5.5_Testing_Web_Applications_-_Reconnaissance.mp4                                     2024-01-31 12:49  121M  
 00034 5.6_Testing_Web_Applications_-_Mapping.mp4                                            2024-01-31 12:49   86M  
 00035 5.7_Testing_Web_Applications_-_Vulnerability_Discovery.mp4                            2024-01-31 12:49  145M  
 00036 5.8_Understanding_the_Exploitation_of_Web_Applications.mp4                            2024-01-31 12:49  103M  
 00037 5.9_Surveying_Defenses_to_Mitigate_Web_Application_Hacking.mp4                        2024-01-31 12:50   19M  
 00038 Learning_objectives.mp4                                                               2024-01-31 12:50   25M  
 00039 6.1_Understanding_Authentication_and_Authorization_Mechanisms.mp4                     2024-01-31 12:50  162M  
 00040 6.2_Understanding_Authentication_and_Authorization_Attacks.mp4                        2024-01-31 12:50  118M  
 00041 6.3_Exploring_Password_Storage_Mechanisms.mp4                                         2024-01-31 12:50   42M  
 00042 6.4_Understanding_Password_Storage_Vulnerability.mp4                                  2024-01-31 12:50   79M  
 00043 6.5_Cracking_Passwords_with_John_the_Ripper.mp4                                       2024-01-31 12:51  402M  
 00044 6.6_Cracking_Passwords_with_hashcat.mp4                                               2024-01-31 12:51  197M  
 00045 6.7_Improving_Password_Security.mp4                                                   2024-01-31 12:52   63M  
 00046 Learning_objectives.mp4                                                               2024-01-31 12:51   29M  
 00047 7.1_Reviewing_Database_Fundamentals.mp4                                               2024-01-31 12:52  102M  
 00048 7.2_Attacking_a_Database_-_Discovery_Validation_and_Exploitation.mp4                  2024-01-31 12:52  243M  
 00049 7.3_Attacking_a_Database_-_Automated_Scanners.mp4                                     2024-01-31 12:52   29M  
 00050 7.4_Surveying_Defenses_to_Mitigate_Database_Hacking.mp4                               2024-01-31 12:53  110M  
 00051 Learning_objectives.mp4                                                               2024-01-31 12:53   61M  
 00052 8.1_Understanding_the_Reasons_for_and_the_Steps_to_Hacking_a_Network.mp4              2024-01-31 12:53  185M  
 00053 8.2_Reviewing_Networking_Technology_Fundamentals_-_OSI_and_DoD_Internet_Models.mp4    2024-01-31 12:54  118M  
 00054 8.3_Reviewing_Networking_Technology_Fundamentals_-_Forwarding_Device_Architecture.mp4 2024-01-31 12:54  129M  
 00055 8.4_Building_an_Internetwork_Topology_Using_VIRL.mp4                                  2024-01-31 12:55  134M  
 00056 8.5_Hacking_Switches_-_Reviewing_Ethernet_Fundamentals.mp4                            2024-01-31 12:55  445M  
 00057 8.6_Hacking_Switches_-_Demo.mp4                                                       2024-01-31 12:55   95M  
 00058 8.7_Hacking_Switches_-_ARP_Vulnerabilities_and_ARP_Cache_Poisoning.mp4                2024-01-31 12:56  124M  
 00059 8.8_Reviewing_Router_Fundamentals.mp4                                                 2024-01-31 12:56  358M  
 00060 8.9_Examining_ICMP_First_Hop_Redundancy_and_Routing_Protocol_Attacks.mp4              2024-01-31 12:56  270M  
 00061 8.10_Hacking_the_Management_Plane.mp4                                                 2024-01-31 12:57  448M  
 00062 8.11_Understanding_Firewall_Fundamentals_and_Levels_of_Inspection.mp4                 2024-01-31 12:58  315M  
 00063 8.12_Performing_Firewall_Reconnaissance_and_Tunneling.mp4                             2024-01-31 12:58  126M  
 00064 8.13_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Packet_Capture.mp4       2024-01-31 12:59  285M  
 00065 8.14_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Switch_and_Router.mp4    2024-01-31 12:59  200M  
 00066 8.15_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_ARP_Spoofing_Tools.mp4   2024-01-31 12:59  206M  
 00067 8.16_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_MiTM_Tools.mp4           2024-01-31 12:59   81M  
 00068 8.17_Surveying_Essential_Tools_for_Hacking_Network_Devices_-_Linux_Tools.mp4          2024-01-31 12:59   97M  
 00069 8.18_Using_Network_Device_Hacking_Tools_to_Perform_a_MiTM_Attack.mp4                  2024-01-31 13:00   65M  
 00070 Learning_objectives.mp4                                                               2024-01-31 13:00   30M  
 00071 9.1_Reviewing_Wireless_Technology_Fundamentals.mp4                                    2024-01-31 13:00  236M  
 00072 9.2_Surveying_Wireless_Hacking_Tools_-_Wireless_Adapters.mp4                          2024-01-31 13:00  230M  
 00073 9.3_Surveying_Wireless_Hacking_Tools_-_Software.mp4                                   2024-01-31 13:01  159M  
 00074 9.4_Hacking_WEP_WPA_and_Other_Protocols.mp4                                           2024-01-31 13:01  311M  
 00075 9.5_Understanding_Hacking_Wireless_Clients.mp4                                        2024-01-31 13:01  188M  
 00076 Learning_objectives.mp4                                                               2024-01-31 13:02   29M  
 00077 10.1_Understanding_Buffer_Overflows.mp4                                               2024-01-31 13:02  188M  
 00078 10.2_Exploiting_Buffer_Overflows.mp4                                                  2024-01-31 13:02  165M  
 00079 10.3_Overcoming_Defenses_for_Buffer_Overflow_Vulnerabilities.mp4                      2024-01-31 13:02   37M  
 00080 10.4_Understanding_Fuzzing.mp4                                                        2024-01-31 13:02   52M  
 00081 10.5_Creating_a_Fuzzing_Strategy.mp4                                                  2024-01-31 13:02  152M  
 00082 10.6_Exploring_Mutation-based_Generation-based_and_Evolutionary_Fuzzers.mp4           2024-01-31 13:02   94M  
 00083 10.7_Surveying_Tools_to_Find_and_Exploit_Buffer_Overflows.mp4                         2024-01-31 13:03  193M  
 00084 Learning_objectives.mp4                                                               2024-01-31 13:03   16M  
 00085 11.1_Understanding_Powershell.mp4                                                     2024-01-31 13:03  245M  
 00086 11.2_Pwning_Windows_Using_PowerShell_-_Empire_Components_Setup_and_Basic_Exploits.mp4 2024-01-31 13:04  404M  
 00087 11.3_Pwning_Windows_Using_PowerShell_-_Empire_Modules_and_Advanced_Exploits.mp4       2024-01-31 13:05  247M  
 00088 11.4_Gathering_Network_Information_Using_PowerShell.mp4                               2024-01-31 13:05  123M  
 00089 Learning_objectives.mp4                                                               2024-01-31 13:05   27M  
 00090 12.1_Understanding_Security_Evasion_Techniques.mp4                                    2024-01-31 13:05  201M  
 00091 12.2_Exploring_Post_Exploitation_Techniques.mp4                                       2024-01-31 13:06   34M  
 00092 12.3_Covering_Your_Tracks.mp4                                                         2024-01-31 13:05   44M  
 00093 Learning_objectives.mp4                                                               2024-01-31 13:05   31M  
 00094 13.1_Understanding_Social_Engineering.mp4                                             2024-01-31 13:06  210M  
 00095 13.2_Exploring_the_Social_Engineering_Toolkit_SET.mp4                                 2024-01-31 13:07  178M  
 00096 13.3_Exploring_Maltego.mp4                                                            2024-01-31 13:06  196M  
 00097 13.4_Surveying_Social_Engineering_Case_Studies.mp4                                    2024-01-31 13:07  250M  
 00098 Learning_objectives.mp4                                                               2024-01-31 13:07   31M  
 00099 14.1_Understanding_Persistence.mp4                                                    2024-01-31 13:08  164M  
 00100 14.2_Gaining_Network_Access.mp4                                                       2024-01-31 13:08  294M  
 00101 14.3_Gaining_Network_Access_with_SMB_Relay_Attacks_NetBIOS_Name_Service.mp4           2024-01-31 13:09  386M  
 00102 14.4_Maintaining_Persistence.mp4                                                      2024-01-31 13:09   28M  
 00103 14.5_Understanding_Pivoting_and_Lateral_Movement.mp4                                  2024-01-31 13:09  215M  
 00104 14.6_Defending_Against_the_Advanced_Persistent_Threat.mp4                             2024-01-31 13:09   53M  
 00105 Learning_objectives.mp4                                                               2024-01-31 13:10   37M  
 00106 15.1_Understanding_Pen_Test_Reports_and_How_They_Are_Used.mp4                         2024-01-31 13:10   94M  
 00107 15.2_Planning_and_Organizing_Your_Report.mp4                                          2024-01-31 13:09   84M  
 00108 15.3_Understanding_the_Pen_Test_Report_Format.mp4                                     2024-01-31 13:10   66M  
 00109 15.4_Exploring_Risk_Ratings.mp4                                                       2024-01-31 13:10   67M  
 00110 15.5_Distributing_Pen_Test_Reports.mp4                                                2024-01-31 13:10   38M  
 00111 Security_Penetration_Testing_-_Summary.mp4                                            2024-01-31 13:10   56M  
 00112 Introduction.mp4                                                                      2024-01-31 13:10  166M  
 00113 Learning_objectives.mp4                                                               2024-01-31 13:11   83M  
 00114 1.1_Understanding_Ethical_Hacking_and_Penetration_Testing.mp4                         2024-01-31 13:11   44M  
 00115 1.2_Surveying_Web_Application_Penetration_Testing_Methodologies.mp4                   2024-01-31 13:11  133M  
 00116 1.3_Understanding_the_Need_for_Web_Application_Penetration_Testing.mp4                2024-01-31 13:11   75M  
 00117 1.4_Exploring_How_Web_Applications_Have_Evolved_Over_Time.mp4                         2024-01-31 13:11  123M  
 00118 1.5_Exploring_What_Programming_Languages_You_Should_Know.mp4                          2024-01-31 13:11  167M  
 00119 Learning_objectives.mp4                                                               2024-01-31 13:12   89M  
 00120 2.1_Understanding_the_Web_Application_Protocols.mp4                                   2024-01-31 13:12  219M  
 00121 2.2_Exploring_the_HTTP_Request_and_Response.mp4                                       2024-01-31 13:12  167M  
 00122 2.3_Surveying_Session_Management_and_Cookies.mp4                                      2024-01-31 13:13  231M  
 00123 2.4_Introducing_DevOps.mp4                                                            2024-01-31 13:13   74M  
 00124 2.5_Exploring_Cloud_Services.mp4                                                      2024-01-31 13:13  108M  
 00125 2.6_Exploring_Web_Application_Frameworks.mp4                                          2024-01-31 13:13   69M  
 00126 2.7_Surveying_Docker_Containers.mp4                                                   2024-01-31 13:14  182M  
 00127 2.8_Introducing_Kubernetes.mp4                                                        2024-01-31 13:14   96M  
 00128 Learning_objectives.mp4                                                               2024-01-31 13:14   91M  
 00129 3.1_Exploring_Kali_Linux.mp4                                                          2024-01-31 13:15  559M  
 00130 3.2_Introducing_Vulnerable_Applications.mp4                                           2024-01-31 13:15   57M  
 00131 3.3_Surveying_DVWA.mp4                                                                2024-01-31 13:15   51M  
 00132 3.4_Surveying_WebGoat.mp4                                                             2024-01-31 13:15   64M  
 00133 3.5_Surveying_Hackazon.mp4                                                            2024-01-31 13:15  100M  
 00134 3.6_Exploring_the_Web_Security_Dojo.mp4                                               2024-01-31 13:15  105M  
 00135 3.7_Understanding_Web_Application_Proxies.mp4                                         2024-01-31 13:16  109M  
 00136 3.8_Understanding_Cyber_Ranges_and_Capture_the_Flag_Events.mp4                        2024-01-31 13:16  109M  
 00137 Learning_objectives.mp4                                                               2024-01-31 13:16  104M  
 00138 4.1_Understanding_Passive_vs._Active_Reconnaissance.mp4                               2024-01-31 13:16  131M  
 00139 4.2_Using_Search_Engines_and_Public_Information.mp4                                   2024-01-31 13:17  162M  
 00140 4.3_Exploring_Shodan_Maltego_Recon-NG_SpiderFoot_and_TheHarvester.mp4                 2024-01-31 13:17  488M  
 00141 4.4_Exploring_CMS_and_Framework_Identification.mp4                                    2024-01-31 13:18  134M  
 00142 4.5_Surveying_Web_Crawlers_and_Directory_Brute_Force.mp4                              2024-01-31 13:18  152M  
 00143 4.6_Understanding_How_Web_Application_Scanners_Work.mp4                               2024-01-31 13:18   64M  
 00144 4.7_Introducing_Nikto.mp4                                                             2024-01-31 13:18  117M  
 00145 4.8_Introducing_the_Burp_Suite.mp4                                                    2024-01-31 13:19  524M  
 00146 4.9_Introducing_OWASP_Zed_Application_Proxy_ZAP.mp4                                   2024-01-31 13:19  170M  
 00147 4.10_Introducing_OpenVAS.mp4                                                          2024-01-31 13:20  266M  
 00148 Learning_objectives.mp4                                                               2024-01-31 13:21   52M  
 00149 5.1_Understanding_Authentication_Schemes_in_Web_Applications.mp4                      2024-01-31 13:21  699M  
 00150 5.2_Exploring_Session_Management_Mechanisms_and_Related_Vulnerabilities.mp4           2024-01-31 13:22  439M  
 00151 Learning_objectives.mp4                                                               2024-01-31 13:22   69M  
 00152 6.1_Understanding_Command_Injection.mp4                                               2024-01-31 13:22   68M  
 00153 6.2_Exploiting_Command_Injection_Vulnerabilities.mp4                                  2024-01-31 13:22   97M  
 00154 6.3_Understanding_SQL_Injection.mp4                                                   2024-01-31 13:24  169M  
 00155 6.4_Exploiting_SQL_Injection_Vulnerabilities.mp4                                      2024-01-31 13:24  808M  
 00156 6.5_Understanding_XML_Injection.mp4                                                   2024-01-31 13:24   47M  
 00157 6.6_Exploiting_XML_Injection_Vulnerabilities.mp4                                      2024-01-31 13:25   81M  
 00158 6.7_Mitigating_Injection_Vulnerabilities.mp4                                          2024-01-31 13:24   79M  
 00159 Learning_objectives.mp4                                                               2024-01-31 13:25   84M  
 00160 7.1_Introducing_XSS.mp4                                                               2024-01-31 13:25   41M  
 00161 7.2_Exploiting_Reflected_XSS_Vulnerabilities.mp4                                      2024-01-31 13:25   82M  
 00162 7.3_Exploiting_Stored_XSS_Vulnerabilities.mp4                                         2024-01-31 13:26  106M  
 00163 7.4_Exploiting_DOM-based_XSS_Vulnerabilities.mp4                                      2024-01-31 13:25  108M  
 00164 7.5_Understanding_Cross-Site_Request_Forgery_CSRF.mp4                                 2024-01-31 13:26   42M  
 00165 7.6_Exploiting_CSRF_Vulnerabilities.mp4                                               2024-01-31 13:26   72M  
 00166 7.7_Evading_Web_Application_Security_Controls.mp4                                     2024-01-31 13:26  185M  
 00167 7.8_Mitigating_XSS_and_CSRF_Vulnerabilities.mp4                                       2024-01-31 13:27  240M  
 00168 Learning_objectives.mp4                                                               2024-01-31 13:28   68M  
 00169 8.1_Introducing_Cryptography_Encryption_and_Hashing_Protocols.mp4                     2024-01-31 13:28  722M  
 00170 8.2_Identifying_Common_Flaws_in_Data_Storage_and_Transmission.mp4                     2024-01-31 13:29  289M  
 00171 8.3_Surveying_Examples_of_Crypto-based_Attacks_and_Vulnerabilities.mp4                2024-01-31 13:29  136M  
 00172 8.4_Mitigating_Flaws_in_Cryptographic_Implementations.mp4                             2024-01-31 13:29  103M  
 00173 Learning_objectives.mp4                                                               2024-01-31 13:29   32M  
 00174 9.1_Understanding_the_APIs.mp4                                                        2024-01-31 13:30   94M  
 00175 9.2_Exploring_the_Tools_Used_to_Test_the_APIs.mp4                                     2024-01-31 13:30  139M  
 00176 Learning_objectives.mp4                                                               2024-01-31 13:30   41M  
 00177 10.1_Surveying_the_Client-side_Code_and_Storage.mp4                                   2024-01-31 13:30  187M  
 00178 10.2_Understanding_HTML5_Implementations.mp4                                          2024-01-31 13:31  212M  
 00179 10.3_Understanding_AJAX_Implementations.mp4                                           2024-01-31 13:31   80M  
 00180 10.4_Mitigating_AJAX_HTML5_and_Client-side_Vulnerabilities.mp4                        2024-01-31 13:31   59M  
 00181 Learning_objectives.mp4                                                               2024-01-31 13:31   63M  
 00182 11.1_Understanding_the_Other_Common_Security_Flaws_in_Web_Applications.mp4            2024-01-31 13:32  132M  
 00183 11.2_Exploiting_Insecure_Direct_Object_References_and_Path_Traversal.mp4              2024-01-31 13:32  309M  
 00184 11.3_Surveying_Information_Disclosure_Vulnerabilities.mp4                             2024-01-31 13:33   52M  
 00185 11.4_Fuzzing_Web_Applications.mp4                                                     2024-01-31 13:33  297M  
 00186 Hacking_Web_Applications_-_Summary.mp4                                                2024-01-31 13:33  165M  
 00187 Introduction.mp4                                                                      2024-01-31 13:33  115M  
 00188 Learning_objectives.mp4                                                               2024-01-31 13:33   27M  
 00189 1.1_Introducing_Wireless_Hacking.mp4                                                  2024-01-31 13:34  254M  
 00190 1.2_Introducing_Wireless_Standards_and_Technologies.mp4                               2024-01-31 13:34  210M  
 00191 1.3_Understanding_the_802.11_Standard.mp4                                             2024-01-31 13:34  144M  
 00192 1.4_Understanding_Bluetooth.mp4                                                       2024-01-31 13:34  112M  
 00193 1.5_Understanding_NFC.mp4                                                             2024-01-31 13:35  130M  
 00194 1.6_Understanding_802.1x_and_Wireless_Authentication_Mechanisms.mp4                   2024-01-31 13:35   98M  
 00195 Learning_objectives.mp4                                                               2024-01-31 13:35   41M  
 00196 2.1_Understanding_Wireless_Client_Attacks_and_Their_Motives.mp4                       2024-01-31 13:35  292M  
 00197 2.2_Learning_Packet_Injection_Attacks.mp4                                             2024-01-31 13:35   24M  
 00198 2.3_Eavesdropping_and_Manipulating_Unencrypted_Wi-Fi_Communications.mp4               2024-01-31 13:36   57M  
 00199 2.4_Attacking_Publicly_Secure_Packet_Forwarding_PSPF.mp4                              2024-01-31 13:35   31M  
 00200 2.5_Attacking_the_Preferred_Network_List_PNL.mp4                                      2024-01-31 13:36   23M  
 00201 Learning_objectives.mp4                                                               2024-01-31 13:36   23M  
 00202 3.1_Understanding_Wireless_Antennas.mp4                                               2024-01-31 13:36  125M  
 00203 3.2_Surveying_Wi-Fi_Devices_Like_the_Pinneaple.mp4                                    2024-01-31 13:36  348M  
 00204 3.3_Building_Your_Own_Lab.mp4                                                         2024-01-31 13:37  165M  
 00205 Learning_objectives.mp4                                                               2024-01-31 13:37   28M  
 00206 4.1_Introducing_the_Aircrack-ng_Suite.mp4                                             2024-01-31 13:37  171M  
 00207 4.2_Introducing_Airmon-ng.mp4                                                         2024-01-31 13:37   37M  
 00208 4.3_Understanding_Airodump-ng.mp4                                                     2024-01-31 13:37   87M  
 00209 4.4_Introducing_Aireplay-ng.mp4                                                       2024-01-31 13:37   89M  
 00210 4.5_Introducing_Airdecap-ng.mp4                                                       2024-01-31 13:38   44M  
 00211 4.6_Introducing_Airserv-ng.mp4                                                        2024-01-31 13:38   82M  
 00212 4.7_Introducing_Airtun-ng.mp4                                                         2024-01-31 13:38   50M  
 00213 Learning_objectives.mp4                                                               2024-01-31 13:38   21M  
 00214 5.1_Understanding_WEP_Fundamentals.mp4                                                2024-01-31 13:38   92M  
 00215 5.2_Learning_How_to_Crack_WEP.mp4                                                     2024-01-31 13:38  136M  
 00216 Learning_objectives.mp4                                                               2024-01-31 13:38   31M  
 00217 6.1_Understanding_WPA_Fundamentals.mp4                                                2024-01-31 13:39  129M  
 00218 6.2_Surveying_Attacks_Against_WPA2-PSK_Networks.mp4                                   2024-01-31 13:38  102M  
 00219 6.3_Using_coWPAtty.mp4                                                                2024-01-31 13:39  165M  
 00220 6.4_Using_Pyrit.mp4                                                                   2024-01-31 13:39   91M  
 00221 6.5_Exploring_WPA_Enterprise_Hacking.mp4                                              2024-01-31 13:39   59M  
 00222 Learning_objectives.mp4                                                               2024-01-31 13:39   24M  
 00223 7.1_Using_Kismet.mp4                                                                  2024-01-31 13:39   60M  
 00224 7.2_Using_Wireshark.mp4                                                               2024-01-31 13:40   53M  
 00225 7.3_Learning_How_to_Hack_Default_Configurations.mp4                                   2024-01-31 13:39   44M  
 00226 Learning_objectives.mp4                                                               2024-01-31 13:40   27M  
 00227 8.1_Defining_Evil_Twin_Attacks.mp4                                                    2024-01-31 13:39   73M  
 00228 8.2_Performing_Evil_Twin_Attacks.mp4                                                  2024-01-31 13:40  228M  
 00229 8.3_Using_Karmetasploit.mp4                                                           2024-01-31 13:40   97M  
 00230 8.4_Exploring_the_WiFi_Pineapple.mp4                                                  2024-01-31 13:40  223M  
 00231 Learning_objectives.mp4                                                               2024-01-31 13:41   23M  
 00232 9.1_Understanding_Bluetooth_Vulnerabilities.mp4                                       2024-01-31 13:41   19M  
 00233 9.2_Surveying_Tools_for_Bluetooth_Monitoring.mp4                                      2024-01-31 13:41  137M  
 00234 Learning_objectives.mp4                                                               2024-01-31 13:41   33M  
 00235 10.1_Understanding_NFC_Vulnerabilities.mp4                                            2024-01-31 13:41   27M  
 00236 10.2_Exploring_NFC_Attacks_and_Case_Studies.mp4                                       2024-01-31 13:41   55M  
 00237 Learning_objectives.mp4                                                               2024-01-31 13:41   25M  
 00238 11.1_Understanding_the_Evolution_of_Wireless_Defenses.mp4                             2024-01-31 13:41   64M  
 00239 11.2_Surveying_Fast_and_Secure_Roaming.mp4                                            2024-01-31 13:41  115M  
 00240 11.3_Understanding_Wireless_Intrusion_Monitoring_and_Prevention.mp4                   2024-01-31 13:41   17M  
 00241 11.4_Understanding_Wireless_Security_Policies.mp4                                     2024-01-31 13:42   24M  
 00242 Learning_objectives.mp4                                                               2024-01-31 13:42   24M  
 00243 12.1_Understanding_IoT_Fundamentals.mp4                                               2024-01-31 13:42  258M  
 00244 12.2_Exploring_ZigBee_and_IEEE_802.15.4.mp4                                           2024-01-31 13:42   50M  
 00245 12.3_Exploring_INSTEON.mp4                                                            2024-01-31 13:42   48M  
 00246 12.4_Exploring_ZWave.mp4                                                              2024-01-31 13:43  212M  
 00247 12.5_Exploring_LoRA.mp4                                                               2024-01-31 13:43   59M  
 00248 Learning_objectives.mp4                                                               2024-01-31 13:43   35M  
 00249 13.1_Understanding_OWASP_Mobile_Device_Vulnerabilities.mp4                            2024-01-31 13:43  160M  
 00250 13.2_Wrestling_with_the_BYOD_Dilemma.mp4                                              2024-01-31 13:43  112M  
 00251 13.3_Understanding_Mobile_Device_Management_MDM.mp4                                   2024-01-31 13:43  120M  
 00252 13.4_Understanding_Mobile_Device_Security_Policies.mp4                                2024-01-31 13:44   93M  
 00253 Learning_objectives.mp4                                                               2024-01-31 13:44   29M  
 00254 14.1_Exploring_The_Android_Security_Model.mp4                                         2024-01-31 13:44  223M  
 00255 14.2_Exploring_Android_Emulators_and_SDK.mp4                                          2024-01-31 13:44   47M  
 00256 14.3_Understanding_Android_Hacking_Tools_and_Methodologies.mp4                        2024-01-31 13:44  276M  
 00257 Learning_objectives.mp4                                                               2024-01-31 13:45   23M  
 00258 15.1_Introducing_iOS_Security.mp4                                                     2024-01-31 13:44   17M  
 00259 15.2_Exploring_Jailbraking_iOS.mp4                                                    2024-01-31 13:45   31M  
 00260 15.3_Surveying_Tools_for_Dissasembling_iOS_Applications.mp4                           2024-01-31 13:45   28M  
 00261 Wireless_Networks_IoT_and_Mobile_Devices_Hacking_-_Summary.mp4                        2024-01-31 13:45   80M  
 00262 Introduction.mp4                                                                      2024-01-31 13:45  124M  
 00263 Learning_objectives.mp4                                                               2024-01-31 13:46   67M  
 00264 1.1_Introducing_Red_Teams_and_Enterprise_Hacking.mp4                                  2024-01-31 13:46  315M  
 00265 1.2_Understanding_Enterprise_Wide_Penetration_Testing.mp4                             2024-01-31 13:46  435M  
 00266 1.3_Understanding_the_Difference_Between_Red_and_Blue_Teams.mp4                       2024-01-31 13:47  160M  
 00267 1.4_Exploring_How_to_Plan_and_Fund_a_Red_Team.mp4                                     2024-01-31 13:47  186M  
 00268 1.5_Surveying_Operational_Processes_and_Policies_for_the_Red_Team.mp4                 2024-01-31 13:47  212M  
 00269 1.6_Understanding_How_to_Create_and_Hire_the_Red_Team.mp4                             2024-01-31 13:47  137M  
 00270 1.7_Understanding_Red_Team_Collaboration.mp4                                          2024-01-31 13:48  151M  
 00271 Learning_objectives.mp4                                                               2024-01-31 13:48   31M  
 00272 2.1_Understanding_the_Red_Team_Environment.mp4                                        2024-01-31 13:48  313M  
 00273 2.2_Understanding_Passive_Recon.mp4                                                   2024-01-31 13:49  334M  
 00274 2.3_Understanding_Active_Recon.mp4                                                    2024-01-31 13:49  145M  
 00275 Learning_objectives.mp4                                                               2024-01-31 13:50   24M  
 00276 3.1_Surveying_Social_Engineering_Methodologies.mp4                                    2024-01-31 13:49  231M  
 00277 3.2_Understanding_How_to_Target_Employees.mp4                                         2024-01-31 13:50  157M  
 00278 3.3_Exploiting_Social_Engineering_Tools.mp4                                           2024-01-31 13:50  192M  
 00279 Learning_objectives.mp4                                                               2024-01-31 13:50   40M  
 00280 4.1_Exploring_Network_and_Vulnerability_Scanning_Methodologies.mp4                    2024-01-31 13:50   69M  
 00281 4.2_Understanding_the_Operational_Impact_of_Enterprise-wide_Scanning.mp4              2024-01-31 13:51   80M  
 00282 4.3_Understanding_Scanning_Tools.mp4                                                  2024-01-31 13:50   46M  
 00283 4.4_Exploring_How_to_Automate_Scans.mp4                                               2024-01-31 13:51  205M  
 00284 4.5_Using_Shodan_and_Its_API.mp4                                                      2024-01-31 13:51  106M  
 00285 4.6_Exploring_Vulnerability_Scanners.mp4                                              2024-01-31 13:51  149M  
 00286 4.7_Understanding_Binary_and_Source_Code_Scanners.mp4                                 2024-01-31 13:52   46M  
 00287 4.8_Understanding_How_to_Perform_Continuous_Monitoring.mp4                            2024-01-31 13:51   39M  
 00288 Learning_objectives.mp4                                                               2024-01-31 13:51   29M  
 00289 5.1_Exploring_How_to_Target_Hosts.mp4                                                 2024-01-31 13:51   40M  
 00290 5.2_Exploring_Web_App_Testing_Essential_Tools.mp4                                     2024-01-31 13:52  171M  
 00291 5.3_Understanding_Enterprise_Application_Continuous_Testing.mp4                       2024-01-31 13:52   95M  
 00292 Learning_objectives.mp4                                                               2024-01-31 13:52   21M  
 00293 6.1_Understanding_How_to_Initially_Get_on_the_Network.mp4                             2024-01-31 13:52   27M  
 00294 6.2_Understanding_What_Hosts_to_Target_and_the_Scope_of_the_Testing.mp4               2024-01-31 13:52   70M  
 00295 6.3_Exploring_the_Hidden_Cost_of_Open_Source_Software.mp4                             2024-01-31 13:53  223M  
 00296 6.4_Learning_How_to_Host_Enterprise_Capture_the_Flag_Events.mp4                       2024-01-31 13:53   98M  
 00297 Learning_objectives.mp4                                                               2024-01-31 13:53   32M  
 00298 7.1_Learning_Privilege_Escalation_Methodologies.mp4                                   2024-01-31 13:53   74M  
 00299 7.2_Understanding_Lateral_Movement.mp4                                                2024-01-31 13:53  218M  
 00300 7.3_Surveying_Privilege_Escalation_Essential_Tools.mp4                                2024-01-31 13:54   59M  
 00301 Learning_objectives.mp4                                                               2024-01-31 13:53   55M  
 00302 8.1_Understanding_Persistent_Access.mp4                                               2024-01-31 13:54   16M  
 00303 8.2_Learning_How_to_Achieve_Domain_Admin_Access.mp4                                   2024-01-31 13:54   79M  
 00304 8.3_Understanding_How_to_Compromise_User_Credentials.mp4                              2024-01-31 13:54  128M  
 00305 8.4_Surveying_Password_Cracking_amp_Reporting.mp4                                     2024-01-31 13:54   48M  
 00306 8.5_Understanding_That_Domain_Admin_Is_Not_the_End_Goal.mp4                           2024-01-31 13:54   36M  
 00307 8.6_Searching_for_Sensitive_Data.mp4                                                  2024-01-31 13:54  142M  
 00308 8.7_Understanding_Data_Exfiltration_Techniques.mp4                                    2024-01-31 13:54  103M  
 00309 8.8_Understanding_How_to_Cover_Your_Tracks.mp4                                        2024-01-31 13:55   78M  
 00310 Learning_objectives.mp4                                                               2024-01-31 13:55   26M  
 00311 9.1_Understanding_the_Challenge_of_Testing_Cloud_Services.mp4                         2024-01-31 13:55  211M  
 00312 9.2_Exploring_How_to_Test_in_the_Cloud.mp4                                            2024-01-31 13:55  182M  
 00313 Learning_objectives.mp4                                                               2024-01-31 13:55   25M  
 00314 10.1_Surveying_Final_Reports_for_Transactional_Penetration_Testing_Events.mp4         2024-01-31 13:55   74M  
 00315 10.2_Surveying_Continouos_Reporting_for_Enterprise_Continuous_Monitoring.mp4          2024-01-31 13:55   29M  
 00316 Enterprise_Penetration_Testing_and_Continuous_Monitoring_-_Summary.mp4                2024-01-31 13:56   92M