06 Network Penetration Testing - Gaining Access (WEPWPAWPA2 Cracking)/034 WPA Cracking - Using a Wordlist Attack.mp47.63MB
06 Network Penetration Testing - Gaining Access (WEPWPAWPA2 Cracking)/036 How to Configure Wireless Security Settings To Secure Your Network.mp411.84MB
07 Network Penetration Testing - Post Connection Attacks/037 Introduction.mp433.1MB
07 Network Penetration Testing - Post Connection Attacks/038 Information Gathering - Discovering Connected Clients using netdiscover.mp46.28MB
07 Network Penetration Testing - Post Connection Attacks/039 Gathering More Information Using Autoscan.mp433.06MB
07 Network Penetration Testing - Post Connection Attacks/040 Gathering Even More Information Using Zenmap.mp422.52MB
11 Gaining Access - Client Side Attacks/069 Generating An Undetectable Backdoor Using Veil 3.mp420.76MB
11 Gaining Access - Client Side Attacks/070 Listening For Incoming Connections.mp412.47MB
11 Gaining Access - Client Side Attacks/071 Using A Basic Delivery Method To Test The Backdoor Hack Windows 10.mp415.96MB
11 Gaining Access - Client Side Attacks/072 Backdoor Delivery Method 1 - Using a Fake Update.mp422.79MB
11 Gaining Access - Client Side Attacks/073 Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.mp426.03MB
11 Gaining Access - Client Side Attacks/074 How to Protect Yourself From The Discussed Delivery Methods.mp415.1MB
12 Gaining Access - Client Side Attacks - Social Engineering/075 Introduction.mp434.33MB
12 Gaining Access - Client Side Attacks - Social Engineering/077 Discovering Websites Links Social Networking Accounts Associated With Target.mp422.61MB
12 Gaining Access - Client Side Attacks - Social Engineering/078 Discovering Twitter Friends Associated Accounts.mp415.29MB
12 Gaining Access - Client Side Attacks - Social Engineering/079 Discovering Emails Of The Targets Friends.mp413.14MB
12 Gaining Access - Client Side Attacks - Social Engineering/080 Analysing The Gathered Info Building An Attack Strategy.mp426.49MB
12 Gaining Access - Client Side Attacks - Social Engineering/081 Backdooring Any File Type (images pdfs ...etc).mp412.76MB
12 Gaining Access - Client Side Attacks - Social Engineering/082 Compiling Changing Trojans Icon.mp416.41MB
12 Gaining Access - Client Side Attacks - Social Engineering/083 Spoofing .exe Extension To Any Extension (jpg pdf ...etc).mp419.3MB
12 Gaining Access - Client Side Attacks - Social Engineering/084 Spoofing Emails - Send Emails As Any Email Account You Want.mp424.22MB
12 Gaining Access - Client Side Attacks - Social Engineering/085 BeEF Overview Basic Hook Method.mp467.33MB
12 Gaining Access - Client Side Attacks - Social Engineering/086 BeEF - hooking targets using MITMf.mp412.76MB
12 Gaining Access - Client Side Attacks - Social Engineering/087 BeEF - Running Basic Commands On Target.mp413.98MB
12 Gaining Access - Client Side Attacks - Social Engineering/088 BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.mp47.29MB
12 Gaining Access - Client Side Attacks - Social Engineering/089 BeEF - Gaining Full Control Over Windows Target.mp410.92MB
12 Gaining Access - Client Side Attacks - Social Engineering/090 Detecting Trojans Manually.mp419.93MB
12 Gaining Access - Client Side Attacks - Social Engineering/091 Detecting Trojans Using a Sandbox.mp414.92MB
13 Gaining Access - Using The Above Attacks Outside The Local Network/092 Overview of the Setup.mp417.28MB
13 Gaining Access - Using The Above Attacks Outside The Local Network/093 Ex1 - Generating a Backdoor That Works Outside The Network.mp415.42MB
13 Gaining Access - Using The Above Attacks Outside The Local Network/094 Configuring The Router To Forward Connections To Kali.mp418.81MB
13 Gaining Access - Using The Above Attacks Outside The Local Network/095 Ex2 - Using BeEF Outside The Network.mp415.21MB
14 Post Exploitation/096 Introduction.mp431.67MB
14 Post Exploitation/097 Meterpreter Basics.mp419.1MB
14 Post Exploitation/098 File System Commands.mp415.87MB
14 Post Exploitation/099 Maintaining Access - Basic Methods.mp416.44MB
14 Post Exploitation/100 Maintaining Access - Using a Reliable Undetectable Method.mp423.85MB