1 - Introduction/1 - Teaser Converting Downloads To Trojans On The Fly & Hacking Windows 10.mp422.02MB
1 - Introduction/2 - Course Overview.mp459.68MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/55 - Introduction to MITMproxy.mp414.35MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/56 - Using MITMproxy In Explicit Mode.mp428.34MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/57 - Analysing Filtering & Highlighting Flows.mp423.61MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/58 - Intercepting Network Flows.mp440MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/59 - Modifying Responses & Injecting Javascript Manually.mp479.83MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/60 - Intercepting & Modifying Responses In Transparent Mode.mp440.7MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/61 - Editing Responses & Injecting BeEFs Code On The Fly.mp4106.21MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/62 - Editing Responses Automatically Based On Regex.mp468.88MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/63 - Bonus Stealing Login Info Using Fake Login Prompt.mp439.29MB
10 - Post Connection Attacks Analysing Data Flows & Running Custom Attacks/64 - Bonus Hacking Windows 10 Using A Fake Update.mp431.84MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/65 - Introduction to MITM Scripts.mp439.81MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/66 - Capturing & Printing RequestsResponses.mp4102.61MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/67 - Filtering Flows & Extracting Useful Data.mp4151.79MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/68 - Using Conditions To Execute Code On Useful Flows.mp4111.35MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/69 - Generating Custom HTTP Responses.mp443.58MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/70 - Testing Script Locally.mp481.4MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/71 - Generating Trojans Installing The Trojan Factory.mp442.59MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/72 - Generating Trojans Converting Any File egimage To a Trojan.mp4126.34MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/73 - Testing Script On Remote Computer To Replace Downloads With a Generic Trojan.mp439.87MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/74 - Executing Bash Commands & Calling Trojan Factory From Our Script.mp432.79MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/75 - Using Variables & More Complex Conditions.mp426.8MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/76 - Converting Downloads To Trojans On The Fly.mp497.88MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/77 - Configuring The Trojan Factorys MITMproxy Script.mp443.93MB
11 - Post Connection Attacks Writing Custom Scripts To Execute Own Attacks/78 - Using The Trojan Factory MITMproxy Script.mp472.72MB
12 - PostConnection Attacks Doing All Of The Above On HTTPS Websites/79 - Bypassing HTTPS With MITMproxy.mp481.8MB
12 - PostConnection Attacks Doing All Of The Above On HTTPS Websites/80 - Replacing HTTPS Downloads.mp441.02MB
12 - PostConnection Attacks Doing All Of The Above On HTTPS Websites/81 - Injecting Data Javascript HTML elements etc In HTTPS Websites.mp442.63MB
12 - PostConnection Attacks Doing All Of The Above On HTTPS Websites/82 - Securing Systems From The Above Post Connection Attacks.mp471.47MB
2 - Back To BasicsPreConnection Attacks/3 - Preconnection Attacks Overview.mp415.99MB
2 - Back To BasicsPreConnection Attacks/4 - Spoofing Mac Address Manually.mp422.49MB
2 - Back To BasicsPreConnection Attacks/5 - Targeting 5 GHz Networks.mp422.38MB
2 - Back To BasicsPreConnection Attacks/6 - Deauthenticating a Client From Protected WiFi Networks.mp435.3MB
2 - Back To BasicsPreConnection Attacks/7 - Deauthenticating Multiple Clients From Protected WiFi Networks.mp439.32MB
2 - Back To BasicsPreConnection Attacks/8 - Deauthenticating All Clients From Protected WiFi Network.mp432.16MB
2 - Back To BasicsPreConnection Attacks/9 - Deauthenticating Same Client From Multiple Bands or Networks.mp482.57MB