6. Network Penetration Testing - Gaining Access (WEPWPAWPA2 Cracking)/11. WPA Cracking - Using a Wordlist Attack.mp47.63MB
6. Network Penetration Testing - Gaining Access (WEPWPAWPA2 Cracking)/13. How to Configure Wireless Security Settings To Secure Your Network.mp411.84MB
7. Network Penetration Testing - Post Connection Attacks/1. Installing Windows As a Virtual Machine.mp451.64MB
7. Network Penetration Testing - Post Connection Attacks/2. Introduction.mp48.05MB
7. Network Penetration Testing - Post Connection Attacks/3. Information Gathering - Discovering Connected Clients using netdiscover.mp46.28MB
7. Network Penetration Testing - Post Connection Attacks/4. Gathering More Information Using Autoscan.mp423.36MB
7. Network Penetration Testing - Post Connection Attacks/5. Gathering Even More Information Using Zenmap.mp422.52MB
11. Gaining Access - Client Side Attacks/4. Generating An Undetectable Backdoor Using Veil 3.mp420.76MB
11. Gaining Access - Client Side Attacks/5. Listening For Incoming Connections.mp412.47MB
11. Gaining Access - Client Side Attacks/6. Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp415.96MB
11. Gaining Access - Client Side Attacks/7. Backdoor Delivery Method 1 - Using a Fake Update.mp422.8MB
11. Gaining Access - Client Side Attacks/8. Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.mp421.94MB
11. Gaining Access - Client Side Attacks/9. How to Protect Yourself From The Discussed Delivery Methods.mp411.29MB
12. Gaining Access - Client Side Attacks - Social Engineering/1. Introduction.mp47.2MB
12. Gaining Access - Client Side Attacks - Social Engineering/2. Maltego Basics.mp471.06MB
12. Gaining Access - Client Side Attacks - Social Engineering/3. Discovering Websites, Links & Social Networking Accounts Associated With Target.mp422.62MB
12. Gaining Access - Client Side Attacks - Social Engineering/4. Discovering Twitter Friends & Associated Accounts.mp415.3MB
12. Gaining Access - Client Side Attacks - Social Engineering/5. Discovering Emails Of The Target's Friends.mp413.14MB
12. Gaining Access - Client Side Attacks - Social Engineering/6. Analysing The Gathered Info & Building An Attack Strategy.mp426.49MB
12. Gaining Access - Client Side Attacks - Social Engineering/7. Backdooring Any File Type (images, pdf's ...etc).mp412.77MB
12. Gaining Access - Client Side Attacks - Social Engineering/8. Compiling & Changing Trojan's Icon.mp416.42MB
12. Gaining Access - Client Side Attacks - Social Engineering/9. Spoofing .exe Extension To Any Extension (jpg, pdf ...etc).mp419.31MB
12. Gaining Access - Client Side Attacks - Social Engineering/10. Spoofing Emails - Send Emails As Any Email Account You Want.mp418.77MB
12. Gaining Access - Client Side Attacks - Social Engineering/11. BeEF Overview & Basic Hook Method.mp418.9MB
12. Gaining Access - Client Side Attacks - Social Engineering/12. BeEF - hooking targets using MITMf.mp48.68MB
12. Gaining Access - Client Side Attacks - Social Engineering/13. BeEF - Running Basic Commands On Target.mp411.45MB
12. Gaining Access - Client Side Attacks - Social Engineering/14. BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.mp45.66MB
12. Gaining Access - Client Side Attacks - Social Engineering/15. BeEF - Gaining Full Control Over Windows Target.mp48.61MB
12. Gaining Access - Client Side Attacks - Social Engineering/16. Detecting Trojans Manually.mp415.09MB
12. Gaining Access - Client Side Attacks - Social Engineering/17. Detecting Trojans Using a Sandbox.mp412.08MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/1. Overview of the Setup.mp417.29MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/2. Ex1 - Generating a Backdoor That Works Outside The Network.mp415.43MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/3. Configuring The Router To Forward Connections To Kali.mp418.82MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/4. Ex2 - Using BeEF Outside The Network.mp415.22MB
14. Post Exploitation/1. Introduction.mp45.48MB
14. Post Exploitation/2. Meterpreter Basics.mp415.23MB
14. Post Exploitation/3. File System Commands.mp412.99MB
14. Post Exploitation/4. Maintaining Access - Basic Methods.mp412.88MB
14. Post Exploitation/5. Maintaining Access - Using a Reliable & Undetectable Method.mp418.35MB