switch to basic browser
📂
📝
📟

🌲 / learning Testing - security CompTIA PenTest+ (PT1-001) Lesson 5 Exploiting Wired and Wireless Networks

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Learning objectives en.srt1945srtsrt2023-09-05 21:06:56
-001. Learning objectives.mp41100821587.7870071003868128h264aacmov1280x72030mp42023-09-05 21:00:47
-002. 5.1 Exploiting Windows Name Resolution-based Vulnerabilities en.srt14009srtsrt2023-09-05 21:06:57
-002. 5.1 Exploiting Windows Name Resolution-based Vulnerabilities.mp420638340556.651973296163125h264aacmov1280x72030mp42023-09-05 21:00:49
-003. 5.2 Surveying DNS Cache Poisoning Attacks en.srt5949srtsrt2023-09-05 21:06:58
-003. 5.2 Surveying DNS Cache Poisoning Attacks.mp414016238245.434921456323125h264aacmov1280x72030mp42023-09-05 21:00:51
-004. 5.3 Attacking and Exploiting Server Message Block (SMB) Implementations en.srt12853srtsrt2023-09-05 21:07:00
-004. 5.3 Attacking and Exploiting Server Message Block (SMB) Implementations.mp435317585474.476553595462125h264aacmov1280x72030mp42023-09-05 21:00:55
-005. 5.4 Understanding Simple Network Management Protocol (SNMP) Vulnerabilities and Exploits en.srt5825srtsrt2023-09-05 21:07:01
-005. 5.4 Understanding Simple Network Management Protocol (SNMP) Vulnerabilities and Exploits.mp411543176222.981224414280125h264aacmov1280x72030mp42023-09-05 21:00:57
-006. 5.5 Exploiting Simple Mail Transfer Protocol (SMTP) Vulnerabilities en.srt9039srtsrt2023-09-05 21:07:03
-006. 5.5 Exploiting Simple Mail Transfer Protocol (SMTP) Vulnerabilities.mp418830687378.71746397264125h264aacmov1280x72030mp42023-09-05 21:01:01
-007. 5.6 Exploiting File Transfer Protocol (FTP) Vulnerabilities en.srt3415srtsrt2023-09-05 21:07:04
-007. 5.6 Exploiting File Transfer Protocol (FTP) Vulnerabilities.mp48237061154.644898426292125h264aacmov1280x72030mp42023-09-05 21:01:03
-008. 5.7 Performing Pass-the-Hash, Man-in-the-middle (MiTM), and SSL Striping Attacks en.srt14701srtsrt2023-09-05 21:07:05
-008. 5.7 Performing Pass-the-Hash, Man-in-the-middle (MiTM), and SSL Striping Attacks.mp424486428589.183152332199125h264aacmov1280x72030mp42023-09-05 21:01:06
-009. 5.7 Performing Pass-the-Hash, Man-in-the-middle (MiTM), and SSL Striping Attacks en.srt14701srtsrt2023-09-05 21:07:07
-009. 5.8 Understanding Denial of Service (Dos) and Distributed Denial of Service (DDoS) Attacks.mp46972134157.013333355221125h264aacmov1280x72030mp42023-09-05 21:01:07
-010. 5.8 Understanding Denial of Service (Dos) and Distributed Denial of Service (DDoS) Attacks en.srt3793srtsrt2023-09-05 21:07:08
-010. 5.9 Performing Network Access Control (NAC) Bypass and VLAN Hopping Attacks.mp423219239606.667755306172125h264aacmov1280x72030mp42023-09-05 21:01:10
-011. 5.10 Understanding Rogue Access Points and Evil Twin Attacks.mp43878644115.52268133128h264aacmov1280x72030mp42023-09-05 21:01:11
-011. 5.8 Understanding Denial of Service (Dos) and Distributed Denial of Service (DDoS) Attacks en.srt3793srtsrt2023-09-05 21:07:09
-012. 5.11 Performing Deauthentication Attacks and Attacking the Preferred Network Lists.mp415301177337.525261362229125h264aacmov1280x72030mp42023-09-05 21:01:13
-012. 5.9 Performing Network Access Control (NAC) Bypass and VLAN Hopping Attacks en.srt14740srtsrt2023-09-05 21:07:10
-013. 5.10 Understanding Rogue Access Points and Evil Twin Attacks en.srt2745srtsrt2023-09-05 21:07:11
-013. 5.12 Jamming Wireless Signal, Causing Interference, and War Driving.mp48426764131.866122511377125h264aacmov1280x72030mp42023-09-05 21:01:16
-014. 5.11 Performing Deauthentication Attacks and Attacking the Preferred Network Lists en.srt7976srtsrt2023-09-05 21:07:12
-014. 5.13 Understanding the WEP Protocol.mp410311708106.772993772637128h264aacmov1280x72030mp42023-09-05 21:01:18
-015. 5.12 Jamming Wireless Signal, Causing Interference, and War Driving en.srt2960srtsrt2023-09-05 21:07:13
-015. 5.14 Cracking WEP Implementations.mp425620356314.885805650517125h264aacmov1280x72030mp42023-09-05 21:01:21
-016. 5.12 Jamming Wireless Signal, Causing Interference, and War Driving en.srt2960srtsrt2023-09-05 21:07:14
-016. 5.15 Understanding the WPA Protocol.mp415651459140.132426893760125h264aacmov1280x72030mp42023-09-05 21:01:23
-017. 5.13 Understanding the WEP Protocol en.srt2870srtsrt2023-09-05 21:07:16
-017. 5.16 Attacking WPA2 Implementations.mp416917168205.0322660526125h264aacmov1280x72030mp42023-09-05 21:01:26
-018. 5.13 Understanding the WEP Protocol en.srt2870srtsrt2023-09-05 21:07:17
-019. 5.14 Cracking WEP Implementations en.srt7662srtsrt2023-09-05 21:07:18
-020. 5.15 Understanding the WPA Protocol en.srt3224srtsrt2023-09-05 21:07:19
-021. 5.16 Attacking WPA2 Implementations en.srt5394srtsrt2023-09-05 21:07:20

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB