[ CourseMega.com ] PluralSight - Tools and Code Analysis for CompTIA Pentest +


[ CourseMega.com ] PluralSight - Tools and Code Analysis for CompTIA Pentest +
Category:
Date:
01/18/22 at 12:43am GMT+1
Submitter:
Seeders:
2
Leechers:
0
File size:
282 MB in 59 files

Torrent Status:
  This torrent has been verified.

Infohash:
e7adc9eb21d0acf28bc974cabed46bdf7933f4d3


File list

  • [ CourseMega.com ] PluralSight - Tools and Code Analysis for CompTIA Pentest +
  • icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/26. What to Expect in This Module.mp4 928.5 KB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/13. What to Expect in This Module.mp4 906.2 KB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/11. Nmap Scripting Engine.mp4 9.8 MB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/24. Credential Access with Responder.mp4 9.3 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/43. Post Exploitation with Metasploit.mp4 9 MB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/15. OSINT with DNS.mp4 8.8 MB
    icon ~Get Your Files Here !/06. Domain Summary/46. Conclusion.mp4 782.2 KB
    icon ~Get Your Files Here !/Exercise Files/demos/SANS Pivot Cheat Sheet.pdf 711.1 KB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/38. Credential Testing with John the Ripper.mp4 7.7 MB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/22. Social Engineering with SET.mp4 7.6 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/39. URI Bruteforcing with Gobuster.mp4 7.4 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/29. Finding WordPress Vulnerabilities Using WPScan.mp4 7.3 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/35. Credential Bruteforcing with Patator.mp4 7.3 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/41. Wifi Attacks with Aircrack-ng.mp4 7.2 MB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/12. Module Summary.mp4 650.2 KB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/30. Finding SQL Vulnerabilities Using SQLMap.mp4 6.7 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/28. Finding Web Vulnerabilities with Nikto.mp4 6.5 MB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/07. Scripting with Bash.mp4 6.3 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/36. Credential Testing with Medusa.mp4 6.2 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/31. Searching for Vulnerabilities Using Searchsploit.mp4 6.1 MB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/09. Scripting with Python.mp4 6 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/45. Module Summary.mp4 565.9 KB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/25. Module Summary.mp4 544 KB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/14. Domain Lookups with WHOIS.mp4 5.8 MB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/19. Scanning with Wapiti.mp4 5.6 MB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/20. Scanning Git Repos Using Trufflehog.mp4 5.4 MB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/18. Information Gathering with theHarvester.mp4 5.3 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/40. Packet Capturing with Wireshark.mp4 5.3 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/34. Generating Word Lists Using CeWL.mp4 5.1 MB
    icon ~Get Your Files Here !/Exercise Files/demos/jtr-cheat-sheet.pdf 471.4 KB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/21. File Reconnaissance with Metagoofil.mp4 4.8 MB
    icon ~Get Your Files Here !/02. Setting the Scene/02. Course Overview.mp4 4.4 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/32. Steganography Using StegSnow.mp4 4.3 MB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/06. Working with Logic Constructs.mp4 4.1 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/37. Credential Testing with Hydra.mp4 4 MB
    icon ~Get Your Files Here !/Bonus Resources.txt 386 B
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/42. Wifi Attacks with Wifite.mp4 3.5 MB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/04. Understanding Scripting Languages.mp4 3.3 MB
    icon ~Get Your Files Here !/Exercise Files/demos/SANS Burp Cheat Sheet.pdf 281.4 KB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/08. Scripting with JavaScript.mp4 2.9 MB
    icon ~Get Your Files Here !/01. Course Overview/01. Course Overview.mp4 2.8 MB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/05. Logic Constructs.mp4 2.7 MB
    icon ~Get Your Files Here !/03. Scripting and Shellcoding/10. Scripting with Ruby.mp4 2.5 MB
    icon ~Get Your Files Here !/02. Setting the Scene/03. Lab Layout.mp4 2.2 MB
    icon ~Get Your Files Here !/Exercise Files/02/setting-the-scene-slides.pdf 2 MB
    icon ~Get Your Files Here !/Exercise Files/demos/SANS NMAP Cheat Sheet.pdf 197.7 KB
    icon ~Get Your Files Here !/Exercise Files/demos/SANS MISC Tools Cheat Sheet.pdf 143.7 KB
    icon ~Get Your Files Here !/Exercise Files/Tools and Code Analysis for CompTIA Pentest - Study Guide.docx 143.5 KB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/17. OSINT with Shodan.mp4 14.9 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/27. Vulnerability Scanning with Nessus.mp4 14.1 MB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/16. OSINT with Maltego.mp4 13.4 MB
    icon ~Get Your Files Here !/Exercise Files/demos/SANS Netcat Cheat Sheet.pdf 127 KB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/44. Website Attacks with BurpSuite.mp4 11.2 MB
    icon ~Get Your Files Here !/04. Reconnaissance to Discovery/23. Social Engineering with BeEF.mp4 10.1 MB
    icon ~Get Your Files Here !/05. Vulnerability Analysis to Exfiltration/33. Steganography Using StegHide.mp4 10 MB
    icon ~Get Your Files Here !/Exercise Files/03/scripting-and-shellcoding-slides.pdf 1.7 MB
    icon ~Get Your Files Here !/Exercise Files/05/vulnerability-analysis-to-exfiltration-slides.pdf 1.6 MB
    icon ~Get Your Files Here !/Exercise Files/04/reconnaissance-to-discovery-slides.pdf 1.6 MB
    icon ~Get Your Files Here !/Exercise Files/06/domain-summary-slides.pdf 1.6 MB

Similar Torrents