f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives en.srt19452023-09-05 21:06:56
-001. Learning objectives.mp4110082152023-09-05 21:00:47
-002. 5.1 Exploiting Windows Name Resolution-based Vulnerabilities en.srt140092023-09-05 21:06:57
-002. 5.1 Exploiting Windows Name Resolution-based Vulnerabilities.mp4206383402023-09-05 21:00:49
-003. 5.2 Surveying DNS Cache Poisoning Attacks en.srt59492023-09-05 21:06:58
-003. 5.2 Surveying DNS Cache Poisoning Attacks.mp4140162382023-09-05 21:00:51
-004. 5.3 Attacking and Exploiting Server Message Block (SMB) Implementations en.srt128532023-09-05 21:07:00
-004. 5.3 Attacking and Exploiting Server Message Block (SMB) Implementations.mp4353175852023-09-05 21:00:55
-005. 5.4 Understanding Simple Network Management Protocol (SNMP) Vulnerabilities and Exploits en.srt58252023-09-05 21:07:01
-005. 5.4 Understanding Simple Network Management Protocol (SNMP) Vulnerabilities and Exploits.mp4115431762023-09-05 21:00:57
-006. 5.5 Exploiting Simple Mail Transfer Protocol (SMTP) Vulnerabilities en.srt90392023-09-05 21:07:03
-006. 5.5 Exploiting Simple Mail Transfer Protocol (SMTP) Vulnerabilities.mp4188306872023-09-05 21:01:01
-007. 5.6 Exploiting File Transfer Protocol (FTP) Vulnerabilities en.srt34152023-09-05 21:07:04
-007. 5.6 Exploiting File Transfer Protocol (FTP) Vulnerabilities.mp482370612023-09-05 21:01:03
-008. 5.7 Performing Pass-the-Hash, Man-in-the-middle (MiTM), and SSL Striping Attacks en.srt147012023-09-05 21:07:05
-008. 5.7 Performing Pass-the-Hash, Man-in-the-middle (MiTM), and SSL Striping Attacks.mp4244864282023-09-05 21:01:06
-009. 5.7 Performing Pass-the-Hash, Man-in-the-middle (MiTM), and SSL Striping Attacks en.srt147012023-09-05 21:07:07
-009. 5.8 Understanding Denial of Service (Dos) and Distributed Denial of Service (DDoS) Attacks.mp469721342023-09-05 21:01:07
-010. 5.8 Understanding Denial of Service (Dos) and Distributed Denial of Service (DDoS) Attacks en.srt37932023-09-05 21:07:08
-010. 5.9 Performing Network Access Control (NAC) Bypass and VLAN Hopping Attacks.mp4232192392023-09-05 21:01:10
-011. 5.10 Understanding Rogue Access Points and Evil Twin Attacks.mp438786442023-09-05 21:01:11
-011. 5.8 Understanding Denial of Service (Dos) and Distributed Denial of Service (DDoS) Attacks en.srt37932023-09-05 21:07:09
-012. 5.11 Performing Deauthentication Attacks and Attacking the Preferred Network Lists.mp4153011772023-09-05 21:01:13
-012. 5.9 Performing Network Access Control (NAC) Bypass and VLAN Hopping Attacks en.srt147402023-09-05 21:07:10
-013. 5.10 Understanding Rogue Access Points and Evil Twin Attacks en.srt27452023-09-05 21:07:11
-013. 5.12 Jamming Wireless Signal, Causing Interference, and War Driving.mp484267642023-09-05 21:01:16
-014. 5.11 Performing Deauthentication Attacks and Attacking the Preferred Network Lists en.srt79762023-09-05 21:07:12
-014. 5.13 Understanding the WEP Protocol.mp4103117082023-09-05 21:01:18
-015. 5.12 Jamming Wireless Signal, Causing Interference, and War Driving en.srt29602023-09-05 21:07:13
-015. 5.14 Cracking WEP Implementations.mp4256203562023-09-05 21:01:21
-016. 5.12 Jamming Wireless Signal, Causing Interference, and War Driving en.srt29602023-09-05 21:07:14
-016. 5.15 Understanding the WPA Protocol.mp4156514592023-09-05 21:01:23
-017. 5.13 Understanding the WEP Protocol en.srt28702023-09-05 21:07:16
-017. 5.16 Attacking WPA2 Implementations.mp4169171682023-09-05 21:01:26
-018. 5.13 Understanding the WEP Protocol en.srt28702023-09-05 21:07:17
-019. 5.14 Cracking WEP Implementations en.srt76622023-09-05 21:07:18
-020. 5.15 Understanding the WPA Protocol en.srt32242023-09-05 21:07:19
-021. 5.16 Attacking WPA2 Implementations en.srt53942023-09-05 21:07:20

control-panel