Jump to content

NetWork Penetration Testing Essentials (PEN-100) - Erik Choron (Feb 2025)


Recommended Posts

541636287_oip.jpg
18.97 GB | 00:09:34 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English



Files Included :
1 Adding more to our security toolkit (184.89 MB)
10 Challenge (68.66 MB)
2 What will Pen-100 cover (261.15 MB)
3 Building Blocks (213.42 MB)
4 Understanding Virtualization (71.64 MB)
5 Type 1 and Type 2 (66.17 MB)
6 Type 2 (33.57 MB)
7 We need permission! (119.22 MB)
8 We need permission! Part 2 (61.97 MB)
9 We need permission! Part 3 (38.26 MB)
1 Baby steps before running (118.5 MB)
10 Solution (236.81 MB)
2 pseudocode (356.47 MB)
3 Where do we script at (275.89 MB)
4 Where do we script at Part 2 (78.23 MB)
5 For Loop (115.45 MB)
6 Using our loop knowledge to check the network (208.44 MB)
7 Saving our work (58.08 MB)
8 Scripting for more details (112.36 MB)
9 Challenge (112.58 MB)
1 Let's learn another loop (89.67 MB)
10 Solution (141.16 MB)
2 Python requirements (109.99 MB)
3 Why Python (109.56 MB)
4 Why Python Part 2 (255.38 MB)
5 Remember Environment Variables (82.7 MB)
6 Scanning with Python (201.13 MB)
7 What's Scapy (225.51 MB)
8 What's the difference between the two (153.32 MB)
9 Challenge (131.54 MB)
1 Introduction (153.32 MB)
2 Bash (89.4 MB)
3 Scripting in Bash (86.84 MB)
4 Scripting in Bash Part 2 (51.06 MB)
5 Making sure we stay in Bash (64.45 MB)
6 Creating a program to run in Bash (70.07 MB)
7 Creating a program to run in Bash Part 2 (86.76 MB)
8 Challenge (48.74 MB)
9 Solution (82.86 MB)
1 Kali being used for good (149.07 MB)
10 Challenge (87.65 MB)
11 Solution (44.45 MB)
2 Kali being used for good Part 2 (96.45 MB)
3 Kali being used for good (48.98 MB)
4 Monitoring and discovering networks Part 1 (64.08 MB)
5 Monitoring and discovering networks Part 2 (18.81 MB)
6 Monitoring and discovering networks Part 3 (40.2 MB)
7 Monitoring and discovering networks Part 4 (52.24 MB)
8 Monitoring for hidden networks (131.15 MB)
9 Monitoring for hidden networks Part 2 (84.74 MB)
1 Metasploit Framework (165.66 MB)
2 Metasploit on Kali (350.9 MB)
3 Systems Without Metasploit (345.83 MB)
4 How to Prep the Target (203.1 MB)
5 Other Metasploit Add-Ins (176.51 MB)
6 Options Outside of Metasploit (164.01 MB)
1 Cryptography Overview (155.18 MB)
2 Synchronous Crypto (219.71 MB)
3 Synchronous Crypto Examples (323.73 MB)
4 Asynchronous Crypto (215.63 MB)
5 Asynchronous Crypto Example (300.05 MB)
6 Cryptography Review (36.78 MB)
1 Knowing our targets (143.9 MB)
2 Web Application Backbone (100.88 MB)
3 Web Application Backbone Part 2 (87.35 MB)
4 POSIX-Based - Apache (69.06 MB)
5 POSIX-Based - Apache Part 2 (27.93 MB)
6 Discovering Web Application use on a target (76.59 MB)
7 Challenge (35.98 MB)
8 Solution (135.89 MB)
1 What is Active Directory (170.48 MB)
2 Installing Active Directory (74.51 MB)
3 Post Install (73.28 MB)
4 Post Install Part 2 (16.17 MB)
5 User and Group information (66.48 MB)
6 Policy Enforcement (53.52 MB)
7 Challenge (28.68 MB)
8 Solution (114.26 MB)
1 What is Kali (59.63 MB)
2 What is Kali Part 2 (60.07 MB)
3 Picking our Kali (60.34 MB)
4 Picking our Kali Part 2 (63.53 MB)
5 Downloading and installing Kali (96.09 MB)
6 Downloading and installing Kali Part 2 (71.88 MB)
7 Live Kali (68.68 MB)
8 Challenge (38.15 MB)
9 Solution (46.99 MB)
1 POSIX-Based Systems (135.75 MB)
10 Challenge (50.46 MB)
11 Solution (72.87 MB)
2 Formatting (147.12 MB)
3 Formatting Part 2 (98.33 MB)
4 Directory Structure (312.46 MB)
5 Missing File Types (216.91 MB)
6 File Permissions (291.96 MB)
7 Usernames and Passwords (296.62 MB)
8 Services and Logs (156.32 MB)
9 Services (218.65 MB)
1 Getting to know Windows (127.59 MB)
2 Formatting (82.04 MB)
3 Formatting Part 2 (29.1 MB)
4 Directory Structuring (81.73 MB)
5 Directory Structuring Part 2 (30.68 MB)
6 File Types (79.81 MB)
7 Username and Passwords (110.72 MB)
8 Challenge (32.5 MB)
9 Solution (45.11 MB)
1 Getting into the Windows Operating System (190.44 MB)
10 Challenge (36.48 MB)
11 Solution (109.09 MB)
2 Local Security Policy (298.92 MB)
3 Local Security Policy Part 2 (271.45 MB)
4 Registry (321.21 MB)
5 Registry Part 2 (210.05 MB)
6 Temporary and Hidden Folders (240.95 MB)
7 Disk Management (111.11 MB)
8 Services and Logs (172.48 MB)
9 Logging (249.63 MB)
1 Linux Networking (124.16 MB)
2 ifconfig (87.94 MB)
3 Where did those interfaces come from (25.67 MB)
4 DNS Configuration (43.94 MB)
5 Routing Configuration (61.06 MB)
6 iptables (95.53 MB)
7 GUI help (17.06 MB)
8 Challenge (39.49 MB)
9 Solution (38.44 MB)
1 Windows Networking (64.57 MB)
10 Solution (87.62 MB)
2 Looping back (223.58 MB)
3 Hardware in VMWare (338.01 MB)
4 Windows PowerShell (303.98 MB)
5 Wireshark (409.65 MB)
6 promisc (110 MB)
7 Windows Firewall (180.51 MB)
8 Wireshark (143.19 MB)
9 Challenge (17.4 MB)
1 Understanding how the network talks (123.85 MB)
10 Bonus video (163.7 MB)
2 Scoping things out (52.7 MB)
3 Scoping things out part 2 (85.05 MB)
4 Capturing some traffic (51.1 MB)
5 Wireshark (116.51 MB)
6 tcpdump (55.83 MB)
7 Active and passive listening (74.03 MB)
8 Challenge (21.84 MB)
9 Solution (32.44 MB)
1 Wireless Networks (229.19 MB)
10 Solution (48.51 MB)
2 Heat mapping (115.81 MB)
3 Addendum (184.77 MB)
4 Wireless Channels and Rogue Access Points (46.54 MB)
5 Going Rogue (235.12 MB)
6 Wireless Promiscuous (62.74 MB)
7 Kismet (69.17 MB)
8 Kismet Part 2 (66.84 MB)
9 Challenge (7.44 MB)]
Screenshot
FbIb9Zw5_o.jpg





https://ausfile.com/2jug772f5bmo/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part01.rar
https://ausfile.com/n1murqj32akr/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part02.rar
https://ausfile.com/m6ubb3c79le5/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part03.rar
https://ausfile.com/d4zuc4lwg5ks/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part04.rar
https://ausfile.com/lumywdj4784w/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part05.rar
https://ausfile.com/r73bfv0z75jy/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part06.rar
https://ausfile.com/3d1b127c9o60/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part07.rar
https://ausfile.com/oxpbvl9o3sai/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part08.rar
https://ausfile.com/8o2wbtpy4zyw/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part09.rar
https://ausfile.com/2ymj2uyu5upb/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part10.rar
https://ausfile.com/dyesr2rjdf2q/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part11.rar
https://ausfile.com/dcbiz8d4mylr/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part12.rar
https://ausfile.com/qkw4nu8fx3gt/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part13.rar
https://ausfile.com/22hbuah3w9f1/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part14.rar
https://ausfile.com/7bvtszw0s002/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part15.rar
https://ausfile.com/xarq1uh762fu/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part16.rar
https://ausfile.com/kmhai7z452t3/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part17.rar
https://ausfile.com/49seas56uxd3/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part18.rar
https://ausfile.com/jl712dg1wxg7/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part19.rar
https://ausfile.com/5yt3hxloi0wy/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part20.rar


https://rapidgator.net/file/f880d4af7af55839bcbcee2941455786/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part01.rar
https://rapidgator.net/file/67983df679d675992dea20893c1244ad/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part02.rar
https://rapidgator.net/file/e1461eff5e09e53d9cf55e122718bb63/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part03.rar
https://rapidgator.net/file/999baf60e7181b65e9e84ca56fcc84c4/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part04.rar
https://rapidgator.net/file/540fbbe0088172edfde282069fc0f5a7/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part05.rar
https://rapidgator.net/file/5199dc3738b3bd34e89e8f604af140a5/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part06.rar
https://rapidgator.net/file/9b9e06d8514f27abcb4ea90c194fe135/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part07.rar
https://rapidgator.net/file/a91e7afbfc16a45d2a4000afe1a6ebd9/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part08.rar
https://rapidgator.net/file/49a619552d7d01a822b632579b275b31/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part09.rar
https://rapidgator.net/file/734c8104f936022fd87f6dbc541f13d7/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part10.rar
https://rapidgator.net/file/846f8d9ed1f2975aaabdb1a9d3f5a602/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part11.rar
https://rapidgator.net/file/cea144d0a341e30ce2dab7c932226988/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part12.rar
https://rapidgator.net/file/d5ef43aa5c3d440500612fbdb28557d1/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part13.rar
https://rapidgator.net/file/75af83a09b9eff1b57cd82b1b3d495f3/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part14.rar
https://rapidgator.net/file/ba2efd9aa55c2905b3c30859f14ad107/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part15.rar
https://rapidgator.net/file/ecc439e4a5479d50cab504ad51559039/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part16.rar
https://rapidgator.net/file/9175778a57ea425f736feb63d5fd541e/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part17.rar
https://rapidgator.net/file/c30ae305815cc42a682b6c2e4706c97e/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part18.rar
https://rapidgator.net/file/562417606b094311178b24c28aafc84b/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part19.rar
https://rapidgator.net/file/9a00c7f64c610edf7fdca0d486a6b510/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part20.rar


https://turbobit.net/qjglfylm627u/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part01.rar.html
https://turbobit.net/hvjw0x7to14s/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part02.rar.html
https://turbobit.net/d05n78p2rlsc/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part03.rar.html
https://turbobit.net/oknifkm37mt3/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part04.rar.html
https://turbobit.net/i4dtihkvt889/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part05.rar.html
https://turbobit.net/1oduhr4mvioo/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part06.rar.html
https://turbobit.net/vjymnby2lf3n/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part07.rar.html
https://turbobit.net/twbgvtwmv9ix/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part08.rar.html
https://turbobit.net/3o8xhs3pimqu/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part09.rar.html
https://turbobit.net/48mxcl0le7ca/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part10.rar.html
https://turbobit.net/9pn7ytf1lgs4/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part11.rar.html
https://turbobit.net/a3k92qai60bt/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part12.rar.html
https://turbobit.net/p08cevm7um8j/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part13.rar.html
https://turbobit.net/tibwvwf1jisx/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part14.rar.html
https://turbobit.net/r9vticaawhur/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part15.rar.html
https://turbobit.net/rcpkbim8k8xs/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part16.rar.html
https://turbobit.net/axc7styx8a9u/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part17.rar.html
https://turbobit.net/6v2vfq242h1d/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part18.rar.html
https://turbobit.net/g32usn3t7rmt/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part19.rar.html
https://turbobit.net/jhp87ascacyy/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part20.rar.html


Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...