switch to basic browser
📂
📝
📟

🌲 / learning Testing - security CompTIA PenTest+ (PT1-001) Lesson 7 Exploiting Local Host and Physical Security Vulnerabilities

c File Name Size files dur q vq aq Vc Ac Fmt Res fps T Date
-001. Learning objectives en.srt321srtsrt2023-09-05 21:07:42
-001. Learning objectives.mp4196990916.768005939803128h264aacmov1280x72030mp42023-09-05 21:02:14
-002. 7.1 Understanding How to Exploit Local Host Vulnerabilities en.srt1088srtsrt2023-09-05 21:07:44
-002. 7.1 Understanding How to Exploit Local Host Vulnerabilities.mp4490385248.212993813678128h264aacmov1280x72030mp42023-09-05 21:02:16
-003. 7.2 Exploiting Insecure Service and Protocol Configurations en.srt5403srtsrt2023-09-05 21:07:45
-003. 7.2 Exploiting Insecure Service and Protocol Configurations.mp417901961222.493605643510125h264aacmov1280x72030mp42023-09-05 21:02:18
-004. 7.3 Understanding Local Privilege Escalation en.srt4256srtsrt2023-09-05 21:07:46
-004. 7.3 Understanding Local Privilege Escalation.mp410465191170.36483491358125h264aacmov1280x72030mp42023-09-05 21:02:20
-005. 7.4 Understanding Linux Permissions en.srt6912srtsrt2023-09-05 21:07:47
-005. 7.4 Understanding Linux Permissions.mp413973501277.037279403270125h264aacmov1280x72030mp42023-09-05 21:02:22
-006. 7.5 Understanding SUID or SGID and Unix Programs en.srt2798srtsrt2023-09-05 21:07:49
-006. 7.5 Understanding SUID or SGID and Unix Programs.mp45170837117.44352217128h264aacmov1280x72030mp42023-09-05 21:02:24
-007. 7.6 Exploiting Insecure SUDO Implementations en.srt4938srtsrt2023-09-05 21:07:50
-007. 7.6 Exploiting Insecure SUDO Implementations.mp411556595199.343311463330125h264aacmov1280x72030mp42023-09-05 21:02:26
-008. 7.7 Understanding Ret2libc Attacks en.srt4345srtsrt2023-09-05 21:07:52
-008. 7.7 Understanding Ret2libc Attacks.mp49574762192.238005398265125h264aacmov1280x72030mp42023-09-05 21:02:27
-009. 7.8 Understanding Windows Privileges en.srt2698srtsrt2023-09-05 21:07:53
-009. 7.8 Understanding Windows Privileges.mp45969350107.583991443308128h264aacmov1280x72030mp42023-09-05 21:02:29
-010. 7.9 Surveying Kerberoasting en.srt1683srtsrt2023-09-05 21:07:54
-010. 7.9 Surveying Kerberoasting.mp4413612266.667007496361128h264aacmov1280x72030mp42023-09-05 21:02:30
-011. 7.10 Exploiting Other Windows-based Vulnerabilities en.srt9688srtsrt2023-09-05 21:07:55
-011. 7.10 Exploiting Other Windows-based Vulnerabilities.mp418302821387.889342377244125h264aacmov1280x72030mp42023-09-05 21:02:33
-012. 7.11 Understanding What Are Key Loggers en.srt2900srtsrt2023-09-05 21:07:56
-012. 7.11 Understanding What Are Key Loggers.mp45468387121.835102359225125h264aacmov1280x72030mp42023-09-05 21:02:34
-013. 7.12 Understanding What Are Scheduled Tasks en.srt1186srtsrt2023-09-05 21:07:57
-013. 7.12 Understanding What Are Scheduled Tasks.mp4291156856.619002411276128h264aacmov1280x72030mp42023-09-05 21:02:35
-014. 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks en.srt13177srtsrt2023-09-05 21:07:58
-014. 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks.mp430323037509.260045476342125h264aacmov1280x72030mp42023-09-05 21:02:39
-015. 7.14 Surveying Mobile Device Security en.srt16923srtsrt2023-09-05 21:08:00
-015. 7.14 Surveying Mobile Device Security.mp442617507662.929705514380125h264aacmov1280x72030mp42023-09-05 21:02:44
-016. 7.15 Understanding How to Exploit Physical Security Vulnerabilities en.srt7882srtsrt2023-09-05 21:08:01
-016. 7.15 Understanding How to Exploit Physical Security Vulnerabilities.mp413408950309.429116346213125h264aacmov1280x72030mp42023-09-05 21:02:46

control-panel

π
f69dc311a936 // 3.77 TiB free of 3.98 TiB