06 Network Penetration Testing - Gaining Access (WEP_WPA_WPA2 Cracking)/034 WPA Cracking - Using a Wordlist Attack.mp47.63MB
06 Network Penetration Testing - Gaining Access (WEP_WPA_WPA2 Cracking)/036 How to Configure Wireless Security Settings To Secure Your Network.mp411.84MB
07 Network Penetration Testing - Post Connection Attacks/037 Introduction.mp48.04MB
07 Network Penetration Testing - Post Connection Attacks/038 Information Gathering - Discovering Connected Clients using netdiscover.mp46.29MB
07 Network Penetration Testing - Post Connection Attacks/039 Gathering More Information Using Autoscan.mp423.36MB
07 Network Penetration Testing - Post Connection Attacks/040 Gathering Even More Information Using Zenmap.mp423.76MB
11 Gaining Access - Client Side Attacks/069 Generating An Undetectable Backdoor Using Veil 3.mp420.76MB
11 Gaining Access - Client Side Attacks/070 Listening For Incoming Connections.mp412.47MB
11 Gaining Access - Client Side Attacks/071 Using A Basic Deliver Method To Test The Backdoor & Hack Windows 10.mp415.96MB
11 Gaining Access - Client Side Attacks/072 Backdoor Delivery Method 1 - Using a Fake Update.mp422.79MB
11 Gaining Access - Client Side Attacks/073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.mp421.94MB
11 Gaining Access - Client Side Attacks/074 How to Protect Yourself From The Discussed Delivery Methods.mp411.29MB
12 Gaining Access - Client Side Attacks - Social Engineering/075 Introduction.mp47.19MB
12 Gaining Access - Client Side Attacks - Social Engineering/076 Maltego Basics.mp417.69MB
12 Gaining Access - Client Side Attacks - Social Engineering/077 Discovering Websites_ Links & Social Networking Accounts Associated With Target.mp422.61MB
12 Gaining Access - Client Side Attacks - Social Engineering/078 Discovering Twitter Friends & Associated Accounts.mp415.29MB
12 Gaining Access - Client Side Attacks - Social Engineering/079 Discovering Emails Of The Target's Friends.mp413.14MB
12 Gaining Access - Client Side Attacks - Social Engineering/080 Analysing The Gathered Info & Building An Attack Stratigy.mp426.49MB
12 Gaining Access - Client Side Attacks - Social Engineering/081 Backdooring Any File Type (images_ pdf's ___etc).mp412.76MB
12 Gaining Access - Client Side Attacks - Social Engineering/082 Compiling & Changing Trojan's Icon.mp416.41MB
12 Gaining Access - Client Side Attacks - Social Engineering/083 Spoofing _exe Extension To Any Extension (jpg_ pdf ___etc).mp419.3MB
12 Gaining Access - Client Side Attacks - Social Engineering/084 Spoofing Emails - Send Emails As Any Email Account You Want.mp418.77MB
12 Gaining Access - Client Side Attacks - Social Engineering/085 BeEF Overview & Basic Hook Method.mp418.89MB
12 Gaining Access - Client Side Attacks - Social Engineering/086 BeEF - hooking targets using MITMf.mp48.67MB
12 Gaining Access - Client Side Attacks - Social Engineering/087 BeEF - Running Basic Commands On Target.mp411.45MB
12 Gaining Access - Client Side Attacks - Social Engineering/088 BeEF - Stealing Credentials_Passwords Using A Fake Login Prompt.mp45.66MB
12 Gaining Access - Client Side Attacks - Social Engineering/089 BeEF - Gaining Full Control Over Windows Target.mp48.61MB
12 Gaining Access - Client Side Attacks - Social Engineering/090 Detecting Trojans Manually.mp415.09MB
12 Gaining Access - Client Side Attacks - Social Engineering/091 Detecting Trojans Using a Sandbox.mp412.08MB
13 Gaining Access - Using The Above Attacks Outside The Local Network/092 Overview of the Setup.mp417.28MB
13 Gaining Access - Using The Above Attacks Outside The Local Network/093 Ex1 - Generating a Backdoor That Works Outside The Network.mp415.42MB
13 Gaining Access - Using The Above Attacks Outside The Local Network/094 Configuring The Router To Forward Connections To Kali.mp418.81MB
13 Gaining Access - Using The Above Attacks Outside The Local Network/095 Ex2 - Using BeEF Outside The Network.mp415.21MB
14 Post Exploitation/096 Introduction.mp45.48MB
14 Post Exploitation/097 Meterpreter Basics.mp415.23MB
14 Post Exploitation/098 File System Commands.mp412.99MB
14 Post Exploitation/099 Maintaining Access - Basic Methods.mp412.88MB
14 Post Exploitation/100 Maintaining Access - Using a Reliable & Undetectable Method.mp418.34MB