| - | 001. Learning objectives en.srt | 321 | | | | | | | | srt | | | srt | 2023-09-05 21:07:42 |
| - | 001. Learning objectives.mp4 | 1969909 | | 16.768005 | 939 | 803 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:14 |
| - | 002. 7.1 Understanding How to Exploit Local Host Vulnerabilities en.srt | 1088 | | | | | | | | srt | | | srt | 2023-09-05 21:07:44 |
| - | 002. 7.1 Understanding How to Exploit Local Host Vulnerabilities.mp4 | 4903852 | | 48.212993 | 813 | 678 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:16 |
| - | 003. 7.2 Exploiting Insecure Service and Protocol Configurations en.srt | 5403 | | | | | | | | srt | | | srt | 2023-09-05 21:07:45 |
| - | 003. 7.2 Exploiting Insecure Service and Protocol Configurations.mp4 | 17901961 | | 222.493605 | 643 | 510 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:18 |
| - | 004. 7.3 Understanding Local Privilege Escalation en.srt | 4256 | | | | | | | | srt | | | srt | 2023-09-05 21:07:46 |
| - | 004. 7.3 Understanding Local Privilege Escalation.mp4 | 10465191 | | 170.36483 | 491 | 358 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:20 |
| - | 005. 7.4 Understanding Linux Permissions en.srt | 6912 | | | | | | | | srt | | | srt | 2023-09-05 21:07:47 |
| - | 005. 7.4 Understanding Linux Permissions.mp4 | 13973501 | | 277.037279 | 403 | 270 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:22 |
| - | 006. 7.5 Understanding SUID or SGID and Unix Programs en.srt | 2798 | | | | | | | | srt | | | srt | 2023-09-05 21:07:49 |
| - | 006. 7.5 Understanding SUID or SGID and Unix Programs.mp4 | 5170837 | | 117.44 | 352 | 217 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:24 |
| - | 007. 7.6 Exploiting Insecure SUDO Implementations en.srt | 4938 | | | | | | | | srt | | | srt | 2023-09-05 21:07:50 |
| - | 007. 7.6 Exploiting Insecure SUDO Implementations.mp4 | 11556595 | | 199.343311 | 463 | 330 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:26 |
| - | 008. 7.7 Understanding Ret2libc Attacks en.srt | 4345 | | | | | | | | srt | | | srt | 2023-09-05 21:07:52 |
| - | 008. 7.7 Understanding Ret2libc Attacks.mp4 | 9574762 | | 192.238005 | 398 | 265 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:27 |
| - | 009. 7.8 Understanding Windows Privileges en.srt | 2698 | | | | | | | | srt | | | srt | 2023-09-05 21:07:53 |
| - | 009. 7.8 Understanding Windows Privileges.mp4 | 5969350 | | 107.583991 | 443 | 308 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:29 |
| - | 010. 7.9 Surveying Kerberoasting en.srt | 1683 | | | | | | | | srt | | | srt | 2023-09-05 21:07:54 |
| - | 010. 7.9 Surveying Kerberoasting.mp4 | 4136122 | | 66.667007 | 496 | 361 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:30 |
| - | 011. 7.10 Exploiting Other Windows-based Vulnerabilities en.srt | 9688 | | | | | | | | srt | | | srt | 2023-09-05 21:07:55 |
| - | 011. 7.10 Exploiting Other Windows-based Vulnerabilities.mp4 | 18302821 | | 387.889342 | 377 | 244 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:33 |
| - | 012. 7.11 Understanding What Are Key Loggers en.srt | 2900 | | | | | | | | srt | | | srt | 2023-09-05 21:07:56 |
| - | 012. 7.11 Understanding What Are Key Loggers.mp4 | 5468387 | | 121.835102 | 359 | 225 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:34 |
| - | 013. 7.12 Understanding What Are Scheduled Tasks en.srt | 1186 | | | | | | | | srt | | | srt | 2023-09-05 21:07:57 |
| - | 013. 7.12 Understanding What Are Scheduled Tasks.mp4 | 2911568 | | 56.619002 | 411 | 276 | 128 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:35 |
| - | 014. 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks en.srt | 13177 | | | | | | | | srt | | | srt | 2023-09-05 21:07:58 |
| - | 014. 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks.mp4 | 30323037 | | 509.260045 | 476 | 342 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:39 |
| - | 015. 7.14 Surveying Mobile Device Security en.srt | 16923 | | | | | | | | srt | | | srt | 2023-09-05 21:08:00 |
| - | 015. 7.14 Surveying Mobile Device Security.mp4 | 42617507 | | 662.929705 | 514 | 380 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:44 |
| - | 016. 7.15 Understanding How to Exploit Physical Security Vulnerabilities en.srt | 7882 | | | | | | | | srt | | | srt | 2023-09-05 21:08:01 |
| - | 016. 7.15 Understanding How to Exploit Physical Security Vulnerabilities.mp4 | 13408950 | | 309.429116 | 346 | 213 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-09-05 21:02:46 |