kingers Posted April 2 Report Share Posted April 2 18.97 GB | 00:09:34 | mp4 | 1920X1080 | 16:9Genre:eLearning |Language:EnglishFiles Included :1 Adding more to our security toolkit (184.89 MB)10 Challenge (68.66 MB)2 What will Pen-100 cover (261.15 MB)3 Building Blocks (213.42 MB)4 Understanding Virtualization (71.64 MB)5 Type 1 and Type 2 (66.17 MB)6 Type 2 (33.57 MB)7 We need permission! (119.22 MB)8 We need permission! Part 2 (61.97 MB)9 We need permission! Part 3 (38.26 MB)1 Baby steps before running (118.5 MB)10 Solution (236.81 MB)2 pseudocode (356.47 MB)3 Where do we script at (275.89 MB)4 Where do we script at Part 2 (78.23 MB)5 For Loop (115.45 MB)6 Using our loop knowledge to check the network (208.44 MB)7 Saving our work (58.08 MB)8 Scripting for more details (112.36 MB)9 Challenge (112.58 MB)1 Let's learn another loop (89.67 MB)10 Solution (141.16 MB)2 Python requirements (109.99 MB)3 Why Python (109.56 MB)4 Why Python Part 2 (255.38 MB)5 Remember Environment Variables (82.7 MB)6 Scanning with Python (201.13 MB)7 What's Scapy (225.51 MB)8 What's the difference between the two (153.32 MB)9 Challenge (131.54 MB)1 Introduction (153.32 MB)2 Bash (89.4 MB)3 Scripting in Bash (86.84 MB)4 Scripting in Bash Part 2 (51.06 MB)5 Making sure we stay in Bash (64.45 MB)6 Creating a program to run in Bash (70.07 MB)7 Creating a program to run in Bash Part 2 (86.76 MB)8 Challenge (48.74 MB)9 Solution (82.86 MB)1 Kali being used for good (149.07 MB)10 Challenge (87.65 MB)11 Solution (44.45 MB)2 Kali being used for good Part 2 (96.45 MB)3 Kali being used for good (48.98 MB)4 Monitoring and discovering networks Part 1 (64.08 MB)5 Monitoring and discovering networks Part 2 (18.81 MB)6 Monitoring and discovering networks Part 3 (40.2 MB)7 Monitoring and discovering networks Part 4 (52.24 MB)8 Monitoring for hidden networks (131.15 MB)9 Monitoring for hidden networks Part 2 (84.74 MB)1 Metasploit Framework (165.66 MB)2 Metasploit on Kali (350.9 MB)3 Systems Without Metasploit (345.83 MB)4 How to Prep the Target (203.1 MB)5 Other Metasploit Add-Ins (176.51 MB)6 Options Outside of Metasploit (164.01 MB)1 Cryptography Overview (155.18 MB)2 Synchronous Crypto (219.71 MB)3 Synchronous Crypto Examples (323.73 MB)4 Asynchronous Crypto (215.63 MB)5 Asynchronous Crypto Example (300.05 MB)6 Cryptography Review (36.78 MB)1 Knowing our targets (143.9 MB)2 Web Application Backbone (100.88 MB)3 Web Application Backbone Part 2 (87.35 MB)4 POSIX-Based - Apache (69.06 MB)5 POSIX-Based - Apache Part 2 (27.93 MB)6 Discovering Web Application use on a target (76.59 MB)7 Challenge (35.98 MB)8 Solution (135.89 MB)1 What is Active Directory (170.48 MB)2 Installing Active Directory (74.51 MB)3 Post Install (73.28 MB)4 Post Install Part 2 (16.17 MB)5 User and Group information (66.48 MB)6 Policy Enforcement (53.52 MB)7 Challenge (28.68 MB)8 Solution (114.26 MB)1 What is Kali (59.63 MB)2 What is Kali Part 2 (60.07 MB)3 Picking our Kali (60.34 MB)4 Picking our Kali Part 2 (63.53 MB)5 Downloading and installing Kali (96.09 MB)6 Downloading and installing Kali Part 2 (71.88 MB)7 Live Kali (68.68 MB)8 Challenge (38.15 MB)9 Solution (46.99 MB)1 POSIX-Based Systems (135.75 MB)10 Challenge (50.46 MB)11 Solution (72.87 MB)2 Formatting (147.12 MB)3 Formatting Part 2 (98.33 MB)4 Directory Structure (312.46 MB)5 Missing File Types (216.91 MB)6 File Permissions (291.96 MB)7 Usernames and Passwords (296.62 MB)8 Services and Logs (156.32 MB)9 Services (218.65 MB)1 Getting to know Windows (127.59 MB)2 Formatting (82.04 MB)3 Formatting Part 2 (29.1 MB)4 Directory Structuring (81.73 MB)5 Directory Structuring Part 2 (30.68 MB)6 File Types (79.81 MB)7 Username and Passwords (110.72 MB)8 Challenge (32.5 MB)9 Solution (45.11 MB)1 Getting into the Windows Operating System (190.44 MB)10 Challenge (36.48 MB)11 Solution (109.09 MB)2 Local Security Policy (298.92 MB)3 Local Security Policy Part 2 (271.45 MB)4 Registry (321.21 MB)5 Registry Part 2 (210.05 MB)6 Temporary and Hidden Folders (240.95 MB)7 Disk Management (111.11 MB)8 Services and Logs (172.48 MB)9 Logging (249.63 MB)1 Linux Networking (124.16 MB)2 ifconfig (87.94 MB)3 Where did those interfaces come from (25.67 MB)4 DNS Configuration (43.94 MB)5 Routing Configuration (61.06 MB)6 iptables (95.53 MB)7 GUI help (17.06 MB)8 Challenge (39.49 MB)9 Solution (38.44 MB)1 Windows Networking (64.57 MB)10 Solution (87.62 MB)2 Looping back (223.58 MB)3 Hardware in VMWare (338.01 MB)4 Windows PowerShell (303.98 MB)5 Wireshark (409.65 MB)6 promisc (110 MB)7 Windows Firewall (180.51 MB)8 Wireshark (143.19 MB)9 Challenge (17.4 MB)1 Understanding how the network talks (123.85 MB)10 Bonus video (163.7 MB)2 Scoping things out (52.7 MB)3 Scoping things out part 2 (85.05 MB)4 Capturing some traffic (51.1 MB)5 Wireshark (116.51 MB)6 tcpdump (55.83 MB)7 Active and passive listening (74.03 MB)8 Challenge (21.84 MB)9 Solution (32.44 MB)1 Wireless Networks (229.19 MB)10 Solution (48.51 MB)2 Heat mapping (115.81 MB)3 Addendum (184.77 MB)4 Wireless Channels and Rogue Access Points (46.54 MB)5 Going Rogue (235.12 MB)6 Wireless Promiscuous (62.74 MB)7 Kismet (69.17 MB)8 Kismet Part 2 (66.84 MB)9 Challenge (7.44 MB)]Screenshothttps://ausfile.com/2jug772f5bmo/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part01.rarhttps://ausfile.com/n1murqj32akr/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part02.rarhttps://ausfile.com/m6ubb3c79le5/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part03.rarhttps://ausfile.com/d4zuc4lwg5ks/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part04.rarhttps://ausfile.com/lumywdj4784w/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part05.rarhttps://ausfile.com/r73bfv0z75jy/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part06.rarhttps://ausfile.com/3d1b127c9o60/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part07.rarhttps://ausfile.com/oxpbvl9o3sai/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part08.rarhttps://ausfile.com/8o2wbtpy4zyw/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part09.rarhttps://ausfile.com/2ymj2uyu5upb/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part10.rarhttps://ausfile.com/dyesr2rjdf2q/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part11.rarhttps://ausfile.com/dcbiz8d4mylr/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part12.rarhttps://ausfile.com/qkw4nu8fx3gt/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part13.rarhttps://ausfile.com/22hbuah3w9f1/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part14.rarhttps://ausfile.com/7bvtszw0s002/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part15.rarhttps://ausfile.com/xarq1uh762fu/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part16.rarhttps://ausfile.com/kmhai7z452t3/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part17.rarhttps://ausfile.com/49seas56uxd3/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part18.rarhttps://ausfile.com/jl712dg1wxg7/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part19.rarhttps://ausfile.com/5yt3hxloi0wy/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part20.rarhttps://rapidgator.net/file/f880d4af7af55839bcbcee2941455786/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part01.rarhttps://rapidgator.net/file/67983df679d675992dea20893c1244ad/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part02.rarhttps://rapidgator.net/file/e1461eff5e09e53d9cf55e122718bb63/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part03.rarhttps://rapidgator.net/file/999baf60e7181b65e9e84ca56fcc84c4/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part04.rarhttps://rapidgator.net/file/540fbbe0088172edfde282069fc0f5a7/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part05.rarhttps://rapidgator.net/file/5199dc3738b3bd34e89e8f604af140a5/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part06.rarhttps://rapidgator.net/file/9b9e06d8514f27abcb4ea90c194fe135/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part07.rarhttps://rapidgator.net/file/a91e7afbfc16a45d2a4000afe1a6ebd9/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part08.rarhttps://rapidgator.net/file/49a619552d7d01a822b632579b275b31/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part09.rarhttps://rapidgator.net/file/734c8104f936022fd87f6dbc541f13d7/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part10.rarhttps://rapidgator.net/file/846f8d9ed1f2975aaabdb1a9d3f5a602/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part11.rarhttps://rapidgator.net/file/cea144d0a341e30ce2dab7c932226988/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part12.rarhttps://rapidgator.net/file/d5ef43aa5c3d440500612fbdb28557d1/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part13.rarhttps://rapidgator.net/file/75af83a09b9eff1b57cd82b1b3d495f3/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part14.rarhttps://rapidgator.net/file/ba2efd9aa55c2905b3c30859f14ad107/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part15.rarhttps://rapidgator.net/file/ecc439e4a5479d50cab504ad51559039/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part16.rarhttps://rapidgator.net/file/9175778a57ea425f736feb63d5fd541e/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part17.rarhttps://rapidgator.net/file/c30ae305815cc42a682b6c2e4706c97e/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part18.rarhttps://rapidgator.net/file/562417606b094311178b24c28aafc84b/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part19.rarhttps://rapidgator.net/file/9a00c7f64c610edf7fdca0d486a6b510/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part20.rarhttps://turbobit.net/qjglfylm627u/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part01.rar.htmlhttps://turbobit.net/hvjw0x7to14s/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part02.rar.htmlhttps://turbobit.net/d05n78p2rlsc/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part03.rar.htmlhttps://turbobit.net/oknifkm37mt3/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part04.rar.htmlhttps://turbobit.net/i4dtihkvt889/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part05.rar.htmlhttps://turbobit.net/1oduhr4mvioo/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part06.rar.htmlhttps://turbobit.net/vjymnby2lf3n/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part07.rar.htmlhttps://turbobit.net/twbgvtwmv9ix/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part08.rar.htmlhttps://turbobit.net/3o8xhs3pimqu/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part09.rar.htmlhttps://turbobit.net/48mxcl0le7ca/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part10.rar.htmlhttps://turbobit.net/9pn7ytf1lgs4/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part11.rar.htmlhttps://turbobit.net/a3k92qai60bt/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part12.rar.htmlhttps://turbobit.net/p08cevm7um8j/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part13.rar.htmlhttps://turbobit.net/tibwvwf1jisx/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part14.rar.htmlhttps://turbobit.net/r9vticaawhur/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part15.rar.htmlhttps://turbobit.net/rcpkbim8k8xs/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part16.rar.htmlhttps://turbobit.net/axc7styx8a9u/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part17.rar.htmlhttps://turbobit.net/6v2vfq242h1d/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part18.rar.htmlhttps://turbobit.net/g32usn3t7rmt/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part19.rar.htmlhttps://turbobit.net/jhp87ascacyy/CBTNuggets.-.Network.Penetration.Testing.Essentials.PEN-100.-.Erik.Choron.Feb.2025.part20.rar.html Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now