CBTNuggets - Hacker Tools, Techniques, and Incident Handling (SEC504)
File List
- 32. Covering Tracks/4. Network Traffic .mp4 519.8 MB
- 33. Establishing Persistence/4. Reconnaissance Information-Gathering .mp4 464.2 MB
- 9. MITRE ATT&CK Framework Introduction/4. Organizational Assessment .mp4 444.5 MB
- 17. Password Attacks/6. Crossing the Rainbow Bridge .mp4 411.6 MB
- 8. Federal Rules of Evidence/2. Daubert Standard .mp4 410.1 MB
- 30. Pivoting and Lateral Movement/5. Persistence .mp4 396.4 MB
- 7. Cloud Investigations/4. Where is the cloud .mp4 390.3 MB
- 14. Enumerating Shadow Cloud Targets/3. Scanning for Clouds .mp4 389.4 MB
- 21. Cloud Spotlight - Insecure Storage/3. Default Storage in Windows .mp4 385.0 MB
- 28. Cloud Spotlight - SSRF and IMDS Attacks/5. SQL Injection .mp4 384.9 MB
- 9. MITRE ATT&CK Framework Introduction/5. Whose Fault is it .mp4 376.0 MB
- 15. Server Message Block (SMB) Sessions/6. Exploiting SMB .mp4 371.6 MB
- 4. Network Investigations/3. Too Many Connections .mp4 371.1 MB
- 32. Covering Tracks/3. Event Logs .mp4 370.6 MB
- 25. Defense Spotlight System Resource Usage Monitor/2. Windows Resource Monitor .mp4 370.0 MB
- 14. Enumerating Shadow Cloud Targets/4. Finding the Key Master .mp4 369.0 MB
- 26. Command Injection/5. Where to Command Inject .mp4 368.9 MB
- 24. Drive-By Attacks/4. Turning the Sandbox into a Honeypot .mp4 367.9 MB
- 27. Cross-Site Scripting (XSS)/2. Common Weak Points .mp4 365.1 MB
- 18. Microsoft 365 Attacks/6. Pivoting and Traffic Analysis .mp4 365.1 MB
- 33. Establishing Persistence/2. What is Establishing Persistence.mp4 361.5 MB
- 10. Open-Source Intelligence/4. Publications and Other Print .mp4 359.9 MB
- 36. Password Spray, Guessing, and Credential Stuffing Attacks/3. Password Guessing .mp4 359.4 MB
- 9. MITRE ATT&CK Framework Introduction/3. Enter the Matrix .mp4 352.6 MB
- 26. Command Injection/3. The Bad .mp4 352.4 MB
- 1. Incident Response/6. Writing Everything Up .mp4 351.1 MB
- 13. Network and Host Scanning with Nmap/4. Dusting for Prints .mp4 350.8 MB
- 27. Cross-Site Scripting (XSS)/5. Third-party Protection .mp4 350.0 MB
- 22. Multi-Purpose Netcat/3. Making Someone Use Netcat .mp4 349.9 MB
- 34. Data Collection/2. Importance .mp4 349.4 MB
- 11. DNS Interrogation/4. Hijacking DNS .mp4 344.1 MB
- 14. Enumerating Shadow Cloud Targets/2. Shadow Components .mp4 340.8 MB
- 13. Network and Host Scanning with Nmap/3. What the Scans Look Like .mp4 340.1 MB
- 33. Establishing Persistence/6. Cloud Post-Exploitation .mp4 336.5 MB
- 31. Hijacking Attacks/2. Predictability .mp4 332.9 MB
- 34. Data Collection/3. Choosing and Configuring Exploits .mp4 331.9 MB
- 22. Multi-Purpose Netcat/6. Covering the Tracks .mp4 328.8 MB
- 12. Website Reconnaissance/2. Understand the Structure .mp4 328.6 MB
- 4. Network Investigations/5. Packet Reading Basics .mp4 325.7 MB
- 3. Live Examination/3. Working with FTK .mp4 323.8 MB
- 19. Understanding Password Hashes/7. Custom Hash Tables .mp4 323.1 MB
- 9. MITRE ATT&CK Framework Introduction/2. Damage Assessment .mp4 322.7 MB
- 6. Malware Investigations/7. Find the Evidence on the Network .mp4 322.1 MB
- 9. MITRE ATT&CK Framework Introduction/6. Moving to Contain .mp4 322.0 MB
- 36. Password Spray, Guessing, and Credential Stuffing Attacks/2. Password Spraying .mp4 320.2 MB
- 34. Data Collection/5. Real Intelligence Threat Analytics .mp4 319.9 MB
- 5. Memory Investigations/5. Volatility .mp4 316.9 MB
- 35. Attacking Windows Active Directory/3. Target Discovery and Enumeration .mp4 315.5 MB
- 35. Attacking Windows Active Directory/5. Internal Attacker Compromise Attribution .mp4 315.2 MB
- 23. Metasploit Framework/3. Systems Without Metasploit .mp4 315.1 MB
- 7. Cloud Investigations/5. Where are we going .mp4 314.3 MB
- 26. Command Injection/4. And The Ugly .mp4 313.0 MB
- 18. Microsoft 365 Attacks/4. If We Can’t Play, No One Can .mp4 312.5 MB
- 27. Cross-Site Scripting (XSS)/4. Using a Site as Our Own .mp4 309.9 MB
- 3. Live Examination/6. Cloning a System .mp4 306.0 MB
- 35. Attacking Windows Active Directory/4. Asset Compromise .mp4 304.1 MB
- 34. Data Collection/6. Where to go From Here .mp4 303.9 MB
- 2. Digital Investigations/2. Identify Digital Evidence .mp4 303.4 MB
- 29. Endpoint Security Bypass/6. Damage the Security .mp4 302.7 MB
- 16. Defense Spotlight DeepBlueCLI/4. Using DeepBlueCLI For Tidbits .mp4 299.6 MB
- 36. Password Spray, Guessing, and Credential Stuffing Attacks/5. Using the Same Thing Over and Over .mp4 299.4 MB
- 22. Multi-Purpose Netcat/4. What Does Netcat Look Like on the Network .mp4 298.8 MB
- 33. Establishing Persistence/3. Applying Open-Source Intelligence .mp4 296.9 MB
- 6. Malware Investigations/4. Finding the Malware .mp4 293.2 MB
- 31. Hijacking Attacks/6. Sending a Care Package .mp4 292.3 MB
- 30. Pivoting and Lateral Movement/2. What’s the Point .mp4 291.3 MB
- 24. Drive-By Attacks/2. How a Drive-By Attack is Planned .mp4 291.1 MB
- 28. Cloud Spotlight - SSRF and IMDS Attacks/4. Cloud Instance Metadata Services Attack .mp4 289.1 MB
- 3. Live Examination/5. Watching the System Talk .mp4 289.1 MB
- 17. Password Attacks/3. When to Attack .mp4 288.8 MB
- 10. Open-Source Intelligence/3. Public Records .mp4 288.2 MB
- 31. Hijacking Attacks/3. Hijacks on the Client Side .mp4 288.1 MB
- 23. Metasploit Framework/2. Metasploit on Kali .mp4 287.4 MB
- 34. Data Collection/4. Delivering Those Exploits .mp4 285.3 MB
- 24. Drive-By Attacks/3. Usual Suspects .mp4 284.3 MB
- 25. Defense Spotlight System Resource Usage Monitor/3. Windows Process IDs .mp4 284.2 MB
- 4. Network Investigations/2. Session Monitoring .mp4 284.0 MB
- 16. Defense Spotlight DeepBlueCLI/5. The Alternatives .mp4 284.0 MB
- 5. Memory Investigations/3. Volatile Memory .mp4 282.2 MB
- 17. Password Attacks/2. What to Attack .mp4 280.2 MB
- 14. Enumerating Shadow Cloud Targets/5. Great Cloud Attacks in History .mp4 279.3 MB
- 31. Hijacking Attacks/5. Man-in-the-Browser .mp4 279.2 MB
- 5. Memory Investigations/4. Extracting the Memory .mp4 278.8 MB
- 22. Multi-Purpose Netcat/5. Command Access .mp4 277.5 MB
- 16. Defense Spotlight DeepBlueCLI/3. Using DeepBlueCLI .mp4 274.6 MB
- 32. Covering Tracks/6. Destroy the Evidence .mp4 274.1 MB
- 12. Website Reconnaissance/3. HTML Basics .mp4 273.6 MB
- 7. Cloud Investigations/2. Identifying the Different Clouds .mp4 273.3 MB
- 18. Microsoft 365 Attacks/5. Crossing the Different Sites .mp4 271.0 MB
- 25. Defense Spotlight System Resource Usage Monitor/6. Sledding Season .mp4 268.6 MB
- 10. Open-Source Intelligence/8. Technical Recon .mp4 265.0 MB
- 20. Password Attack Examples/2. Hiren (boot disc) .mp4 263.3 MB
- 30. Pivoting and Lateral Movement/3. Digging on the Initial System .mp4 262.9 MB
- 29. Endpoint Security Bypass/3. Piggybacking Off Trusted Applications .mp4 262.5 MB
- 21. Cloud Spotlight - Insecure Storage/4. File Sharing in Windows Server .mp4 261.9 MB
- 7. Cloud Investigations/6. Understand the flow .mp4 261.6 MB
- 8. Federal Rules of Evidence/1. Federal Rules of Evidence .mp4 261.1 MB
- 29. Endpoint Security Bypass/2. Bypassing Through Websites .mp4 258.7 MB
- 18. Microsoft 365 Attacks/2. Out with the old… .mp4 258.7 MB
- 17. Password Attacks/4. Where to Attack .mp4 257.8 MB
- 21. Cloud Spotlight - Insecure Storage/2. The Harm in Sharing Too Much .mp4 255.9 MB
- 20. Password Attack Examples/5. John the Ripper .mp4 255.7 MB
- 35. Attacking Windows Active Directory/7. Email Compromises .mp4 255.2 MB
- 16. Defense Spotlight DeepBlueCLI/6. Breaking Some Events .mp4 253.8 MB
- 11. DNS Interrogation/8. DNS Defenses .mp4 253.2 MB
- 28. Cloud Spotlight - SSRF and IMDS Attacks/3. Server-Side Request Forgery (SSRF) .mp4 253.1 MB
- 13. Network and Host Scanning with Nmap/5. What’s Under the Mask .mp4 251.1 MB
- 2. Digital Investigations/3. Understanding the Disc .mp4 248.7 MB
- 2. Digital Investigations/4. Basics of Coding .mp4 247.0 MB
- 6. Malware Investigations/5. The Hunt Begins .mp4 246.5 MB
- 11. DNS Interrogation/2. What is DNS .mp4 246.2 MB
- 4. Network Investigations/6. Network Analysis WITH SSLTLS .mp4 245.6 MB
- 5. Memory Investigations/2. How RAM Operates .mp4 244.8 MB
- 12. Website Reconnaissance/5. Crawling Around .mp4 243.7 MB
- 30. Pivoting and Lateral Movement/6. Internal Threats .mp4 243.4 MB
- 1. Incident Response/4. Event Detection .mp4 243.1 MB
- 36. Password Spray, Guessing, and Credential Stuffing Attacks/6. Time for Reviewing .mp4 242.1 MB
- 2. Digital Investigations/5. Network Devices .mp4 241.3 MB
- 27. Cross-Site Scripting (XSS)/6. XSS Review .mp4 240.0 MB
- 36. Password Spray, Guessing, and Credential Stuffing Attacks/4. Credential Stuffing .mp4 239.9 MB
- 2. Digital Investigations/6. Operating Systems .mp4 237.4 MB
- 1. Incident Response/7. When is it a Legal Problem .mp4 237.2 MB
- 32. Covering Tracks/5. It Wasn’t Me! .mp4 237.1 MB
- 35. Attacking Windows Active Directory/2. Knowing Active Directory .mp4 236.9 MB
- 15. Server Message Block (SMB) Sessions/4. Using SMB .mp4 236.5 MB
- 21. Cloud Spotlight - Insecure Storage/5. POSIX-based File Permissions .mp4 235.0 MB
- 19. Understanding Password Hashes/5. Is Hashing Enough .mp4 233.1 MB
- 30. Pivoting and Lateral Movement/4. I’m Not Done With You Yet! .mp4 232.2 MB
- 1. Incident Response/8. Interfacing With Law Enforcement .mp4 231.4 MB
- 3. Live Examination/2. Approaching the System .mp4 231.2 MB
- 21. Cloud Spotlight - Insecure Storage/6. Sharing on a Web Server in IIS .mp4 229.8 MB
- 25. Defense Spotlight System Resource Usage Monitor/5. POSIX-Based Process IDs .mp4 228.6 MB
- 8. Federal Rules of Evidence/4. Rule 701 .mp4 227.9 MB
- 10. Open-Source Intelligence/5. Walking Around the Neighborhood .mp4 227.0 MB
- 19. Understanding Password Hashes/3. Which Hash to Pick .mp4 225.5 MB
- 28. Cloud Spotlight - SSRF and IMDS Attacks/2. WebGoat .mp4 221.9 MB
- 1. Incident Response/2. Incident Handling Process .mp4 221.1 MB
- 1. Incident Response/5. Eradicate and Recover .mp4 218.9 MB
- 28. Cloud Spotlight - SSRF and IMDS Attacks/6. Famous for the Wrong Reasons .mp4 218.7 MB
- 11. DNS Interrogation/6. Verify the DNS .mp4 218.3 MB
- 19. Understanding Password Hashes/6. Building Some Known Hashes .mp4 217.2 MB
- 26. Command Injection/2. The Good .mp4 217.1 MB
- 8. Federal Rules of Evidence/5. Rule 901 .mp4 215.9 MB
- 20. Password Attack Examples/6. Network Device Cracking .mp4 215.1 MB
- 10. Open-Source Intelligence/2. Open-Source Legality .mp4 213.2 MB
- 7. Cloud Investigations/7. Tool Usage .mp4 212.7 MB
- 8. Federal Rules of Evidence/3. Rule 702 .mp4 212.3 MB
- 20. Password Attack Examples/4. Hashcat .mp4 211.5 MB
- 13. Network and Host Scanning with Nmap/2. Types of Scans .mp4 210.4 MB
- 12. Website Reconnaissance/4. Behind the Scenes .mp4 210.0 MB
- 23. Metasploit Framework/4. How to Prep the Target .mp4 207.7 MB
- 24. Drive-By Attacks/5. Analyze an Attack to Build Against it .mp4 206.4 MB
- 18. Microsoft 365 Attacks/3. Phishing is Still an Issue .mp4 206.3 MB
- 12. Website Reconnaissance/6. Network Signatures .mp4 205.5 MB
- 19. Understanding Password Hashes/2. What is Hashing .mp4 204.0 MB
- 6. Malware Investigations/6. What’s in the Payload .mp4 203.7 MB
- 20. Password Attack Examples/3. Salting our Passwords .mp4 201.8 MB
- 10. Open-Source Intelligence/6. The Google .mp4 201.6 MB
- 27. Cross-Site Scripting (XSS)/3. Directory Browsing .mp4 200.9 MB
- 15. Server Message Block (SMB) Sessions/2. What is SMB .mp4 199.3 MB
- 3. Live Examination/7. Moving to the Next Step .mp4 195.0 MB
- 17. Password Attacks/5. Why (How) to Attack .mp4 191.1 MB
- 8. Federal Rules of Evidence/6. Rule 902 .mp4 188.2 MB
- 8. Federal Rules of Evidence/7. Tying it all together.mp4 186.7 MB
- 16. Defense Spotlight DeepBlueCLI/2. Installing DeepBlueCLI .mp4 185.4 MB
- 19. Understanding Password Hashes/4. Hash Collisions .mp4 185.0 MB
- 6. Malware Investigations/3. Malware Alert! .mp4 184.5 MB
- 33. Establishing Persistence/5. Post-Exploitation .mp4 183.6 MB
- 5. Memory Investigations/6. Comparing to the System .mp4 183.2 MB
- 1. Incident Response/3. Preparing for the Incident .mp4 179.8 MB
- 15. Server Message Block (SMB) Sessions/3. SMB Security Features .mp4 175.2 MB
- 11. DNS Interrogation/5. Crafting DNS Packets .mp4 173.4 MB
- 23. Metasploit Framework/1. Metasploit Framework .mp4 171.6 MB
- 29. Endpoint Security Bypass/5. Doing the Research .mp4 171.2 MB
- 25. Defense Spotlight System Resource Usage Monitor/4. POSIX-Based Resource Monitors .mp4 169.2 MB
- 2. Digital Investigations/7. Reading Materials .mp4 167.8 MB
- 23. Metasploit Framework/6. Options Outside of Metasploit .mp4 165.7 MB
- 24. Drive-By Attacks/6. Using Those Results to Help .mp4 164.3 MB
- 35. Attacking Windows Active Directory/6. Known Active Directory Attacks .mp4 164.1 MB
- 26. Command Injection/6. More Detailed Hunting .mp4 159.2 MB
- 15. Server Message Block (SMB) Sessions/5. SMB Defense .mp4 158.2 MB
- 7. Cloud Investigations/3. Specializing Those Clouds .mp4 157.2 MB
- 22. Multi-Purpose Netcat/2. What is Netcat .mp4 155.5 MB
- 6. Malware Investigations/2. Know the Enemy .mp4 154.0 MB
- 10. Open-Source Intelligence/7. Time Traveling .mp4 153.6 MB
- 13. Network and Host Scanning with Nmap/1. Network and Host Scanning with Nmap .mp4 153.5 MB
- 29. Endpoint Security Bypass/4. It's a Phony! .mp4 150.9 MB
- 4. Network Investigations/4. Knowing the Boundaries .mp4 144.4 MB
- 23. Metasploit Framework/5. Other Metasploit Add-Ins .mp4 143.9 MB
- 31. Hijacking Attacks/4. Man-in-the-Middle .mp4 141.2 MB
- 11. DNS Interrogation/7. Zone Transfers .mp4 138.6 MB
- 18. Microsoft 365 Attacks/1. Microsoft 365 Attacks .mp4 135.3 MB
- 12. Website Reconnaissance/1. Website Reconnaissance .mp4 132.8 MB
- 32. Covering Tracks/2. Why Cover Your Tracks .mp4 131.7 MB
- 25. Defense Spotlight System Resource Usage Monitor/7. Making a NOP Sled .mp4 130.1 MB
- 3. Live Examination/4. Working with EnCase .mp4 119.2 MB
- 14. Enumerating Shadow Cloud Targets/1. Enumerating Shadow Cloud Targets .mp4 116.1 MB
- 31. Hijacking Attacks/7. Back to the Classics .mp4 115.4 MB
- 22. Multi-Purpose Netcat/1. Multi-purpose Netcat .mp4 114.2 MB
- 29. Endpoint Security Bypass/1. Endpoint Security Bypass .mp4 113.1 MB
- 17. Password Attacks/1. Password Attacks .mp4 109.1 MB
- 2. Digital Investigations/1. Digital Investigations .mp4 108.0 MB
- 32. Covering Tracks/1. Covering Tracks .mp4 107.7 MB
- 6. Malware Investigations/8. Report the Findings .mp4 98.4 MB
- 5. Memory Investigations/1. Memory Investigations .mp4 90.7 MB
- 30. Pivoting and Lateral Movement/1. Pivoting and Lateral Movement .mp4 89.2 MB
- 17. Password Attacks/7. Rainbow Addendum .mp4 87.8 MB
- 21. Cloud Spotlight - Insecure Storage/1. Cloud Spotlight – Insecure Storage .mp4 86.9 MB
- 11. DNS Interrogation/3. DNS records .mp4 84.8 MB
- 10. Open-Source Intelligence/1. Open-Source Intelligence.mp4 82.6 MB
- 33. Establishing Persistence/1. Establishing Persistence .mp4 80.4 MB
- 7. Cloud Investigations/1. Cloud Investigations .mp4 80.1 MB
- 29. Endpoint Security Bypass/7. Keep Updated .mp4 79.3 MB
- 28. Cloud Spotlight - SSRF and IMDS Attacks/1. Cloud Spotlight – SSRF, IMDS, and SQL Injection Attacks .mp4 75.1 MB
- 27. Cross-Site Scripting (XSS)/1. Cross-Site Scripting (XSS) .mp4 66.4 MB
- 34. Data Collection/1. Data Collection .mp4 65.6 MB
- 4. Network Investigations/1. Network Investigations .mp4 65.1 MB
- 24. Drive-By Attacks/1. Drive-By Attacks .mp4 59.9 MB
- 20. Password Attack Examples/1. Password Attack Exercise .mp4 59.9 MB
- 1. Incident Response/1. Incident Response .mp4 53.3 MB
- 31. Hijacking Attacks/1. Hijacking Attacks .mp4 52.1 MB
- 16. Defense Spotlight DeepBlueCLI/1. DeepBlueCLI .mp4 46.5 MB
- 3. Live Examination/1. Live Examination -2.mp4 43.5 MB
- 36. Password Spray, Guessing, and Credential Stuffing Attacks/1. Password Spray, Guessing, and Credential Stuffing Attacks .mp4 40.7 MB
- 26. Command Injection/1. Command Injection .mp4 39.5 MB
- 25. Defense Spotlight System Resource Usage Monitor/1. System Resource Usage Monitor .mp4 39.5 MB
- 35. Attacking Windows Active Directory/1. Attacking Windows Active Directory .mp4 39.4 MB
- 9. MITRE ATT&CK Framework Introduction/1. MITRE ATT&CK Framework Introduction .mp4 34.3 MB
- 19. Understanding Password Hashes/1. Understanding Password Hashes .mp4 33.0 MB
- 6. Malware Investigations/1. Malware Investigations .mp4 23.8 MB
- 15. Server Message Block (SMB) Sessions/1. Server Message Block (SMB) Sessions .mp4 23.2 MB
- 11. DNS Interrogation/1. DNS Interrogation .mp4 18.7 MB
- 5. Memory Investigations/memory_investigations.zip 2.2 MB
- 16. Defense Spotlight DeepBlueCLI/dfns_sptlght_dpblecli.zip 10.9 KB
- 24. Drive-By Attacks/drv_by_ttcks.zip 568 bytes
- 30. Pivoting and Lateral Movement/pvtng_ltrl_mvmnt.zip 478 bytes
- 26. Command Injection/cmmnd_njctn.zip 262 bytes
- 25. Defense Spotlight System Resource Usage Monitor/dfns_sg_mntr.zip 239 bytes
Download Torrent
Related Resources
- Kali Linux hacker tools, tricks and techniques ... 1.4 GB
- SEC504 Hacker Tools, Techniques, Exploits, and ... 3.0 GB
- Bradley Cantrel - Modeling the Environment Tech... 19.3 MB
- Compilers Principles, Techniques, and Tools, 2n... 5.0 MB
- Aho - Compilers - Principles, Techniques, and T... 48.2 MB
- Compilers Principles, Techniques, and Tools, Up... 15.3 MB
- A to Z Of BDSM give you ideas, tools, technique... 1.1 MB
- Rodrigues D. Advanced functions of KALI Linux. ... 942.0 KB
- Dance Music Manual - Tools, Toys, and Technique... 27.6 MB
- [computer-internet] Modern Artificial Intellige... 21.0 MB
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.