Section 11 - Gaining Access - Client Side Attacks/65 - Generating an Undetectable Backdoor.mp470.17MB
Section 11 - Gaining Access - Client Side Attacks/66 - Listening For Incoming Connections.mp431.85MB
Section 11 - Gaining Access - Client Side Attacks/67 - Backdoor Delivery Method 1 - Using a Fake Update.mp428.27MB
Section 11 - Gaining Access - Client Side Attacks/68 - Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.mp426.03MB
Section 11 - Gaining Access - Client Side Attacks/69 - How to Protect Yourself From The Discussed Delivery Methods.mp415.1MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/70 - Introduction.mp434.33MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/71 - Finding Websites_Accounts Associated With Target Person.mp421.71MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/72 - Gathering Information About Target's Facebook Account.mp414.69MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/73 - Gathering Information About Targets Twitter Account.mp413.04MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/74 - Gathering Information About Target's Email Account.mp420.89MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/75 - Analysing Gathered Information & Building Social Engineering Strategy.mp417.65MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/76 - Backdooring Executable Files.mp422.12MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/77 - Backdooring Any File Type (images, pdf's ...etc).mp433.81MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/78 - Spoofing .exe Extension To Any Extension (jpg, pdf ...etc).mp422.62MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/79 - Spoofing Emails - Send Emails As Any Email Account You Want.mp424.22MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/80 - BeEF Overview & Basic Hook Method.mp467.33MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/81 - BeEF - hooking targets using MITMf.mp412.76MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/82 - BeEF - Running Basic Commands On Target.mp413.98MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/83 - BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt.mp47.29MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/84 - BeEF - Gaining Full Control Over Windows Target.mp410.92MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/85 - Detecting Trojans Manually.mp419.93MB
Section 12 - Gaining Access - Client Side Attacks - Social Engineering/86 - Detecting Trojans Using a Sandbox.mp414.92MB
Section 13 - Post Exploitation/87 - Introduction.mp431.67MB
Section 13 - Post Exploitation/88 - Meterpreter Basics.mp419.1MB
Section 13 - Post Exploitation/89 - File System Commands.mp415.87MB