:Search:

OSCP PEN 200 Penetration Testing with Kali Linux 2023

Torrent:
Info Hash: 8A232F203CC140B3B04B7F7B67427ED00533ACB5
Similar Posts:
Uploader: hazing4864
Source: 1 Logo 1337x
Downloads: 4543
Type: Tutorials
Language: English
Description:
General
Complete name                            : PEN-200 - Penetration Testing with Kali Linux Videos\10. LOCATING PUBLIC EXPLOITS\10.2. Exploiting a Target\10.2.1. Putting It Together.mp4
Format                                   : MPEG-4
Format profile                           : Base Media
Codec ID                                 : isom (isom/iso2/avc1/mp41)
File size                                : 34.5 MiB
Duration                                 : 8 min 45 s
Overall bit rate                         : 551 kb/s
Frame rate                               : 30.000 FPS
Writing application                      : Lavf58.45.100
Video
ID                                       : 1
Format                                   : AVC
Format/Info                              : Advanced Video Codec
Format profile                           : [email protected]
Format settings                          : CABAC / 5 Ref Frames
Format settings, CABAC                   : Yes
Format settings, Reference frames        : 5 frames
Codec ID                                 : avc1
Codec ID/Info                            : Advanced Video Coding
Duration                                 : 8 min 44 s
Bit rate                                 : 353 kb/s
Width                                    : 1 280 pixels
Height                                   : 720 pixels
Display aspect ratio                     : 16:9
Frame rate mode                          : Constant
Frame rate                               : 30.000 FPS
Color space                              : YUV
Chroma subsampling                       : 4:2:0
Bit depth                                : 8 bits
Scan type                                : Progressive
Bits/(Pixel*Frame)                       : 0.013
Stream size                              : 22.1 MiB (64%)
Writing library                          : x264 core 161 r3027 4121277
Encoding settings                        : cabac=1 / ref=5 / deblock=1:0:0 / analyse=0x3:0x113 / me=hex / subme=8 / psy=1 / psy_rd=1.00:0.00 / mixed_ref=1 / me_range=16 / chroma_me=1 / trellis=2 / 8x8dct=1 / cqm=0 / deadzone=21,11 / fast_pskip=1 / chroma_qp_offset=-2 / threads=2 / lookahead_threads=1 / sliced_threads=0 / nr=0 / decimate=1 / interlaced=0 / bluray_compat=0 / stitchable=1 / constrained_intra=0 / bframes=3 / b_pyramid=2 / b_adapt=2 / b_bias=0 / direct=3 / weightb=1 / open_gop=0 / weightp=2 / keyint=infinite / keyint_min=30 / scenecut=40 / intra_refresh=0 / rc_lookahead=50 / rc=crf / mbtree=1 / crf=20.0 / qcomp=0.60 / qpmin=5 / qpmax=69 / qpstep=4 / vbv_maxrate=2750 / vbv_bufsize=7500 / crf_max=0.0 / nal_hrd=none / filler=0 / ip_ratio=1.40 / aq=1:1.00
Color range                              : Limited
Color primaries                          : BT.709
Transfer characteristics                 : BT.709
Matrix coefficients                      : BT.709
Codec configuration box                  : avcC
Audio
ID                                       : 2
Format                                   : AAC LC
Format/Info                              : Advanced Audio Codec Low Complexity
Codec ID                                 : mp4a-40-2
Duration                                 : 8 min 45 s
Bit rate mode                            : Constant
Bit rate                                 : 192 kb/s
Channel(s)                               : 2 channels
Channel layout                           : L R
Sampling rate                            : 48.0 kHz
Frame rate                               : 46.875 FPS (1024 SPF)
Compression mode                         : Lossy
Stream size                              : 11.9 MiB (34%)
Default                                  : Yes
Alternate group                          : 1
Category: Other
Size: 3.0 GB
Added: Aug. 7, 2025, 8:10 a.m.
Peers: Seeders: 23, Leechers: 0 (Last updated: 3 weeks, 3 days ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://tracker.rarbg.torrentbay.st:6969/announce 0 0 0
udp://tracker.opentrackr.org:1337/announce 23 0 4490
udp://open.demonoid.ch:6969/announce 0 0 0
udp://open.demonii.com:1337/announce (Failed to scrape UDP tracker) 0 0 0
udp://open.stealth.si:80/announce 0 0 53
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://wepzone.net:6969/announce 0 0 0
udp://tracker1.myporn.club:9337/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.srv00.com:6969/announce (Invalid scrape response) 0 0 0
Files:
  1. 12.1.1. Manual Enumeration.mp4 78.9 MB
  2. 1.1.1. Whois Enumeration.mp4 7.8 MB
  3. 1.1.1. Whois Enumeration.vtt 1.8 KB
  4. 1.1.2. Google Hacking.mp4 13.1 MB
  5. 1.1.2. Google Hacking.vtt 4.9 KB
  6. 1.1.3. Netcraft.mp4 6.1 MB
  7. 1.1.3. Netcraft.vtt 1.5 KB
  8. 1.1.4. Open-Source Code.mp4 5.2 MB
  9. 1.1.4. Open-Source Code.vtt 1.7 KB
  10. 1.1.5. Shodan.mp4 9.8 MB
  11. 1.1.5. Shodan.vtt 2.3 KB
  12. 1.1.6. Security Headers and SSL_TLS.mp4 7.4 MB
  13. 1.1.6. Security Headers and SSL_TLS.vtt 2.5 KB
  14. 1.2.1. DNS Enumeration.mp4 31.4 MB
  15. 1.2.1. DNS Enumeration.vtt 9.7 KB
  16. 1.2.2. Port Scanning with Nmap.mp4 41.5 MB
  17. 1.2.2. Port Scanning with Nmap.vtt 16.8 KB
  18. 1.2.3. SMB Enumeration.mp4 12.9 MB
  19. 1.2.3. SMB Enumeration.vtt 4.5 KB
  20. 1.2.4. SMTP Enumeration.mp4 8.1 MB
  21. 1.2.4. SMTP Enumeration.vtt 2.6 KB
  22. 1.2.5. SNMP Enumeration.mp4 19.4 MB
  23. 1.2.5. SNMP Enumeration.vtt 6.0 KB
  24. 2.1.1. Nessus Components.mp4 17.2 MB
  25. 2.1.1. Nessus Components.vtt 4.4 KB
  26. 2.1.2. Performing a Vulnerability Scan.mp4 16.4 MB
  27. 2.1.2. Performing a Vulnerability Scan.vtt 5.8 KB
  28. 2.1.3. Analyzing the Results.mp4 22.3 MB
  29. 2.1.3. Analyzing the Results.vtt 6.6 KB
  30. 2.1.4. Performing an Authenticated Vulnerability Scan.mp4 20.4 MB
  31. 2.1.4. Performing an Authenticated Vulnerability Scan.vtt 6.9 KB
  32. 2.1.5. Working with Nessus Plugins.mp4 22.4 MB
  33. 2.1.5. Working with Nessus Plugins.vtt 5.3 KB
  34. 2.2.1. NSE Vulnerability Scripts.mp4 20.0 MB
  35. 2.2.1. NSE Vulnerability Scripts.vtt 5.2 KB
  36. 2.2.2. Working with NSE Scripts.mp4 12.2 MB
  37. 2.2.2. Working with NSE Scripts.vtt 3.3 KB
  38. 3.1.1. Fingerprinting Web Servers with Nmap.mp4 3.5 MB
  39. 3.1.1. Fingerprinting Web Servers with Nmap.vtt 1.3 KB
  40. 3.1.2. Directory Brute Force with Gobuster.mp4 4.0 MB
  41. 3.1.2. Directory Brute Force with Gobuster.vtt 1.6 KB
  42. 3.1.3. Security Testing with Burp Suite.mp4 34.8 MB
  43. 3.1.3. Security Testing with Burp Suite.vtt 9.0 KB
  44. 3.2.1. Debugging Page Content.mp4 13.1 MB
  45. 3.2.1. Debugging Page Content.vtt 3.5 KB
  46. 3.2.2. Inspecting HTTP Response Headers and Sitemaps.mp4 12.2 MB
  47. 3.2.2. Inspecting HTTP Response Headers and Sitemaps.vtt 3.3 KB
  48. 3.2.3. Enumerating and Abusing APIs.mp4 28.3 MB
  49. 3.2.3. Enumerating and Abusing APIs.vtt 10.2 KB
  50. 3.3.1. Basic XSS.mp4 15.1 MB
  51. 3.3.1. Basic XSS.vtt 3.1 KB
  52. 3.3.2. Privilege Escalation via XSS.mp4 34.2 MB
  53. 3.3.2. Privilege Escalation via XSS.vtt 9.3 KB
  54. 4.1.1. Absolute vs Relative Paths.mp4 14.2 MB
  55. 4.1.1. Absolute vs Relative Paths.vtt 4.4 KB
  56. 4.1.2. Identifying and Exploiting Directory Traversals.mp4 38.3 MB
  57. 4.1.2. Identifying and Exploiting Directory Traversals.vtt 8.5 KB
  58. 4.1.3. Encoding Special Characters.mp4 5.9 MB
  59. 4.1.3. Encoding Special Characters.vtt 2.3 KB
  60. 4.2.1. Local File Inclusion (LFI).mp4 45.0 MB
  61. 4.2.1. Local File Inclusion (LFI).vtt 9.2 KB
  62. 4.2.2. PHP Wrappers.mp4 16.3 MB
  63. 4.2.2. PHP Wrappers.vtt 5.9 KB
  64. 4.2.3. Remote File Inclusion (RFI).mp4 7.1 MB
  65. 4.2.3. Remote File Inclusion (RFI).vtt 3.0 KB
  66. 4.3.1. Using Executable Files.mp4 29.9 MB
  67. 4.3.1. Using Executable Files.vtt 7.3 KB
  68. 4.3.2. Using Non-Executable Files.mp4 29.9 MB
  69. 4.3.2. Using Non-Executable Files.vtt 7.5 KB
  70. 4.4.1. OS Command Injection.mp4 23.6 MB
  71. 4.4.1. OS Command Injection.vtt 7.7 KB
  72. 5.1.1. DB Types and Characteristics.mp4 12.4 MB
  73. 5.1.1. DB Types and Characteristics.vtt 5.6 KB
  74. 5.2.1. Identifying SQLi via Error-based Paylaods.mp4 12.5 MB
  75. 5.2.1. Identifying SQLi via Error-based Paylaods.vtt 5.2 KB
  76. 5.2.2. UNION-based Payloads.mp4 14.4 MB
  77. 5.2.2. UNION-based Payloads.vtt 6.3 KB
  78. 5.2.3. Blind SQL Injections.mp4 7.2 MB
  79. 5.2.3. Blind SQL Injections.vtt 3.3 KB
  80. 5.3.1. Manual Code Execution.mp4 11.4 MB
  81. 5.3.1. Manual Code Execution.vtt 4.2 KB
  82. 5.3.2. Automating the Attack.mp4 24.6 MB
  83. 5.3.2. Automating the Attack.vtt 3.6 KB
  84. 6.1.1. Information Gathering.mp4 12.0 MB
  85. 6.1.1. Information Gathering.vtt 4.1 KB
  86. 6.1.2. Client Fingerprinting.mp4 16.9 MB
  87. 6.1.2. Client Fingerprinting.vtt 6.2 KB
  88. 6.2.1. Leveraging Microsoft Word Macros.mp4 38.8 MB
  89. 6.2.1. Leveraging Microsoft Word Macros.vtt 8.8 KB
  90. 6.3.1. Obtaining Code Execution via Windows Library Files.mp4 45.4 MB
  91. 6.3.1. Obtaining Code Execution via Windows Library Files.vtt 13.2 KB
  92. 7.1.1. Detection Methods.mp4 19.0 MB
  93. 7.1.1. Detection Methods.vtt 6.2 KB
  94. 7.2.1. Evading AV with Thread Injection.mp4 56.5 MB
  95. 7.2.1. Evading AV with Thread Injection.vtt 10.3 KB
  96. 7.2.2. Automating the Process.mp4 27.3 MB
  97. 7.2.2. Automating the Process.vtt 7.2 KB
  98. 8.1.1. SSH and RDP.mp4 14.4 MB
  99. 8.1.1. SSH and RDP.vtt 3.9 KB
  100. 8.1.2. HTTP POST Login Form.mp4 20.9 MB
  101. 8.1.2. HTTP POST Login Form.vtt 5.8 KB
  102. 8.2.1. Introduction to Encryption, Hashes and Cracking.mp4 20.9 MB
  103. 8.2.1. Introduction to Encryption, Hashes and Cracking.vtt 8.2 KB
  104. 8.2.2. Mutating Wordlists.mp4 32.2 MB
  105. 8.2.2. Mutating Wordlists.vtt 12.4 KB
  106. 8.2.3. Password Manager.mp4 29.0 MB
  107. 8.2.3. Password Manager.vtt 6.3 KB
  108. 8.2.4. SSH Private Key Passphrase.mp4 33.5 MB
  109. 8.2.4. SSH Private Key Passphrase.vtt 8.5 KB
  110. 8.3.1. Cracking NTLM.mp4 26.8 MB
  111. 8.3.1. Cracking NTLM.vtt 5.3 KB
  112. 8.3.2. Passing NTLM.mp4 28.5 MB
  113. 8.3.2. Passing NTLM.vtt 7.9 KB
  114. 8.3.3. Cracking Net-NTLMv2.mp4 21.7 MB
  115. 8.3.3. Cracking Net-NTLMv2.vtt 4.7 KB
  116. 8.3.4. Relaying Net-NTLMv2.mp4 17.6 MB
  117. 8.3.4. Relaying Net-NTLMv2.vtt 4.3 KB
  118. 9.1.1. Importing and Examining the Exploit.mp4 7.8 MB
  119. 9.1.1. Importing and Examining the Exploit.vtt 2.9 KB
  120. 9.1.2. Cross-Compiling Exploit Code.mp4 7.8 MB
  121. 9.1.2. Cross-Compiling Exploit Code.vtt 2.2 KB
  122. 9.1.3. Fixing the Exploit.mp4 33.3 MB
  123. 9.1.3. Fixing the Exploit.vtt 4.2 KB
  124. 9.1.4. Changing the Overflow Buffer.mp4 18.6 MB
  125. 9.1.4. Changing the Overflow Buffer.vtt 3.5 KB
  126. 9.2.1. Selecting the Vulnerability and Fixing the Code.mp4 14.3 MB
  127. 9.2.1. Selecting the Vulnerability and Fixing the Code.vtt 3.4 KB
  128. 9.2.2. Troubleshooting the 'index out of range' Error.mp4 16.5 MB
  129. 9.2.2. Troubleshooting the 'index out of range' Error.vtt 3.0 KB
  130. 10.1.1. SearchSploit.mp4 17.9 MB
  131. 10.1.1. SearchSploit.vtt 3.9 KB
  132. 10.1.2. Nmap NSE Scripts.mp4 4.4 MB
  133. 10.1.2. Nmap NSE Scripts.vtt 1.2 KB
  134. 10.2.1. Putting It Together.mp4 34.5 MB
  135. 10.2.1. Putting It Together.vtt 8.0 KB
  136. 11.1.1. Situational Awareness.mp4 65.0 MB
  137. 11.1.1. Situational Awareness.vtt 18.1 KB
  138. 11.1.2. Hidden in Plain View.mp4 33.8 MB
  139. 11.1.2. Hidden in Plain View.vtt 9.8 KB
  140. 11.1.3. Information Goldmine PowerShell.mp4 37.3 MB
  141. 11.1.3. Information Goldmine PowerShell.vtt 12.9 KB
  142. 11.1.4. Automated Enumeration.mp4 24.8 MB
  143. 11.1.4. Automated Enumeration.vtt 6.0 KB
  144. 11.2.1. Service Binary Hijacking.mp4 65.8 MB
  145. 11.2.1. Service Binary Hijacking.vtt 15.5 KB
  146. 11.2.2. Service DLL Hijacking.mp4 69.7 MB
  147. 11.2.2. Service DLL Hijacking.vtt 15.1 KB
  148. 11.2.3. Unquoted Service Paths.mp4 48.8 MB
  149. 11.2.3. Unquoted Service Paths.vtt 12.5 KB
  150. 11.3.1. Scheduled Tasks.mp4 21.1 MB
  151. 11.3.1. Scheduled Tasks.vtt 4.4 KB
  152. 11.3.2. Using Exploits.mp4 22.3 MB
  153. 11.3.2. Using Exploits.vtt 9.7 KB
  154. PEN200.pdf 37.9 MB
  155. 12.1.1. Manual Enumeration.vtt 24.6 KB
  156. 12.1.2. Automated Enumeration.mp4 11.3 MB
  157. 12.1.2. Automated Enumeration.vtt 3.2 KB
  158. 12.2.1. Inspecting User Trails.mp4 16.9 MB
  159. 12.2.1. Inspecting User Trails.vtt 5.5 KB
  160. 12.2.2. Inspecting Service Footprints.mp4 7.7 MB
  161. 12.2.2. Inspecting Service Footprints.vtt 3.5 KB
  162. 12.3.1. Abusing Cron Jobs.mp4 10.3 MB
  163. 12.3.1. Abusing Cron Jobs.vtt 3.3 KB
  164. 12.3.2. Abusing Password Authentication.mp4 7.0 MB
  165. 12.3.2. Abusing Password Authentication.vtt 3.0 KB
  166. 12.4.1. Abusing Setuid Binaries and Capabilities.mp4 21.0 MB
  167. 12.4.1. Abusing Setuid Binaries and Capabilities.vtt 8.0 KB
  168. 12.4.2. Abusing Sudo.mp4 15.2 MB
  169. 12.4.2. Abusing Sudo.vtt 3.9 KB
  170. 12.4.3. Exploiting Kernel Vulnerabilities.mp4 15.9 MB
  171. 12.4.3. Exploiting Kernel Vulnerabilities.vtt 5.6 KB
  172. 13.1.1. A Simple Port Forwarding Scenario.mp4 7.7 MB
  173. 13.1.1. A Simple Port Forwarding Scenario.vtt 4.3 KB
  174. 13.1.2. Setting Up the Lab Environment.mp4 34.4 MB
  175. 13.1.2. Setting Up the Lab Environment.vtt 8.1 KB
  176. 13.1.3. Port Forwarding with Socat.mp4 29.6 MB
  177. 13.1.3. Port Forwarding with Socat.vtt 6.9 KB
  178. 13.2.1. SSH Local Port Forwarding.mp4 46.5 MB
  179. 13.2.1. SSH Local Port Forwarding.vtt 11.7 KB
  180. 13.2.2. SSH Dynamic Port Forwarding.mp4 26.3 MB
  181. 13.2.2. SSH Dynamic Port Forwarding.vtt 8.5 KB
  182. 13.2.3. SSH Remote Port Forwarding.mp4 17.3 MB
  183. 13.2.3. SSH Remote Port Forwarding.vtt 6.7 KB
  184. 13.2.4. SSH Remote Dynamic Port Forwarding.mp4 15.9 MB
  185. 13.2.4. SSH Remote Dynamic Port Forwarding.vtt 6.0 KB
  186. 13.2.5. Using sshuttle.mp4 7.1 MB
  187. 13.2.5. Using sshuttle.vtt 2.5 KB
  188. 13.3.1. ssh.exe.mp4 12.5 MB
  189. 13.3.1. ssh.exe.vtt 3.7 KB
  190. 13.3.2. Plink.mp4 19.9 MB
  191. 13.3.2. Plink.vtt 6.6 KB
  192. 13.3.3. Netsh.mp4 24.1 MB
  193. 13.3.3. Netsh.vtt 5.8 KB
  194. 14.1.1. HTTP Tunneling Fundamentals.mp4 4.7 MB
  195. 14.1.1. HTTP Tunneling Fundamentals.vtt 1.9 KB
  196. 14.1.2. HTTP Tunneling with Chisel.mp4 24.3 MB
  197. 14.1.2. HTTP Tunneling with Chisel.vtt 8.7 KB
  198. 14.2.1. DNS Tunneling Fundamentals.mp4 44.0 MB
  199. 14.2.1. DNS Tunneling Fundamentals.vtt 11.7 KB
  200. 14.2.2. DNS Tunneling with dnscat2.mp4 25.1 MB
  201. 14.2.2. DNS Tunneling with dnscat2.vtt 5.5 KB
  202. 15.1.1. Setup and Work with MSF.mp4 17.2 MB
  203. 15.1.1. Setup and Work with MSF.vtt 6.5 KB
  204. 15.1.2. Auxiliary Modules.mp4 28.6 MB
  205. 15.1.2. Auxiliary Modules.vtt 7.5 KB
  206. 15.1.3. Exploit Modules.mp4 32.1 MB
  207. 15.1.3. Exploit Modules.vtt 11.3 KB
  208. 15.2.1. Staged vs Non-Staged Payloads.mp4 10.4 MB
  209. 15.2.1. Staged vs Non-Staged Payloads.vtt 3.3 KB
  210. 15.2.2. Meterpreter Payload.mp4 49.3 MB
  211. 15.2.2. Meterpreter Payload.vtt 9.2 KB
  212. 15.2.3. Executable Payloads.mp4 24.8 MB
  213. 15.2.3. Executable Payloads.vtt 6.5 KB
  214. 15.3.1. Core Meterpreter Post-Exploitation Features.mp4 39.9 MB
  215. 15.3.1. Core Meterpreter Post-Exploitation Features.vtt 8.8 KB
  216. 15.3.2. Post-Exploitation Modules.mp4 33.0 MB
  217. 15.3.2. Post-Exploitation Modules.vtt 5.8 KB
  218. 15.3.3. Pivoting with Metasploit.mp4 37.2 MB
  219. 15.3.3. Pivoting with Metasploit.vtt 8.2 KB
  220. 15.4.1. Resource Scripts.mp4 17.6 MB
  221. 15.4.1. Resource Scripts.vtt 5.7 KB
  222. 16.1.1. Active Directory - Enumeration Using Legacy Windows Tools.mp4 9.9 MB
  223. 16.1.1. Active Directory - Enumeration Using Legacy Windows Tools.vtt 4.0 KB
  224. 16.1.2. Enumerating Active Directory using PowerShell and .NET Classes.mp4 20.8 MB
  225. 16.1.2. Enumerating Active Directory using PowerShell and .NET Classes.vtt 6.0 KB
  226. 16.1.3. Adding Search Functionality to our Script.mp4 55.4 MB
  227. 16.1.3. Adding Search Functionality to our Script.vtt 11.9 KB
  228. 16.1.4. AD Enumeration with PowerView.mp4 9.8 MB
  229. 16.1.4. AD Enumeration with PowerView.vtt 4.7 KB
  230. 16.2.1. Enumerating Operating Systems.mp4 4.1 MB
  231. 16.2.1. Enumerating Operating Systems.vtt 1.7 KB
  232. 16.2.2. Getting an Overview - Permissions and Logged on Users.mp4 34.1 MB
  233. 16.2.2. Getting an Overview - Permissions and Logged on Users.vtt 16.3 KB
  234. 16.2.3. Enumeration Through Service Principal Names.mp4 6.6 MB
  235. 16.2.3. Enumeration Through Service Principal Names.vtt 2.1 KB
  236. 16.2.4. Enumerating Object Permissions.mp4 19.5 MB
  237. 16.2.4. Enumerating Object Permissions.vtt 7.6 KB
  238. 16.2.5. Enumerating Domain Shares.mp4 15.3 MB
  239. 16.2.5. Enumerating Domain Shares.vtt 5.1 KB
  240. 16.3.1. Collecting Data with SharpHound.mp4 8.5 MB
  241. 16.3.1. Collecting Data with SharpHound.vtt 3.0 KB
  242. 16.3.2. Analysing Data using BloodHound.mp4 46.8 MB
  243. 16.3.2. Analysing Data using BloodHound.vtt 13.6 KB
  244. 17.1.1. Cached AD Credentials.mp4 17.9 MB
  245. 17.1.1. Cached AD Credentials.vtt 4.9 KB
  246. 17.2.1. Password Attacks.mp4 30.3 MB
  247. 17.2.1. Password Attacks.vtt 10.9 KB
  248. 17.2.2. AS-REP Roasting.mp4 16.9 MB
  249. 17.2.2. AS-REP Roasting.vtt 4.2 KB
  250. 17.2.3. Kerberoasting.mp4 24.9 MB
  251. 17.2.3. Kerberoasting.vtt 4.1 KB
  252. 17.2.4. Silver Tickets.mp4 23.6 MB
  253. 17.2.4. Silver Tickets.vtt 7.5 KB
  254. 17.2.5. Domain Controller Synchronization.mp4 14.3 MB
  255. 17.2.5. Domain Controller Synchronization.vtt 3.7 KB
  256. 18.1.1. WMI and WinRM.mp4 29.1 MB
  257. 18.1.1. WMI and WinRM.vtt 7.7 KB
  258. 18.1.2. PsExec.mp4 4.5 MB
  259. 18.1.2. PsExec.vtt 1.3 KB
  260. 18.1.3. Pass the Hash.mp4 3.6 MB
  261. 18.1.3. Pass the Hash.vtt 1.0 KB
  262. 18.1.4. Overpass the Hash.mp4 22.0 MB
  263. 18.1.4. Overpass the Hash.vtt 5.0 KB
  264. 18.1.5. Pass the Ticket.mp4 20.8 MB
  265. 18.1.5. Pass the Ticket.vtt 3.8 KB
  266. 18.1.6. DCOM.mp4 10.2 MB
  267. 18.1.6. DCOM.vtt 2.8 KB
  268. 18.2.1. Golden Ticket.mp4 17.6 MB
  269. 18.2.1. Golden Ticket.vtt 4.9 KB
  270. 18.2.2. Shadow Copies.mp4 9.8 MB
  271. 18.2.2. Shadow Copies.vtt 2.7 KB

Discussion