| parent folder | - | - |
| - | 001. Learning objectives en.srt | 321 | 2023-09-05 21:07:42 |
| - | 001. Learning objectives.mp4 | 1969909 | 2023-09-05 21:02:14 |
| - | 002. 7.1 Understanding How to Exploit Local Host Vulnerabilities en.srt | 1088 | 2023-09-05 21:07:44 |
| - | 002. 7.1 Understanding How to Exploit Local Host Vulnerabilities.mp4 | 4903852 | 2023-09-05 21:02:16 |
| - | 003. 7.2 Exploiting Insecure Service and Protocol Configurations en.srt | 5403 | 2023-09-05 21:07:45 |
| - | 003. 7.2 Exploiting Insecure Service and Protocol Configurations.mp4 | 17901961 | 2023-09-05 21:02:18 |
| - | 004. 7.3 Understanding Local Privilege Escalation en.srt | 4256 | 2023-09-05 21:07:46 |
| - | 004. 7.3 Understanding Local Privilege Escalation.mp4 | 10465191 | 2023-09-05 21:02:20 |
| - | 005. 7.4 Understanding Linux Permissions en.srt | 6912 | 2023-09-05 21:07:47 |
| - | 005. 7.4 Understanding Linux Permissions.mp4 | 13973501 | 2023-09-05 21:02:22 |
| - | 006. 7.5 Understanding SUID or SGID and Unix Programs en.srt | 2798 | 2023-09-05 21:07:49 |
| - | 006. 7.5 Understanding SUID or SGID and Unix Programs.mp4 | 5170837 | 2023-09-05 21:02:24 |
| - | 007. 7.6 Exploiting Insecure SUDO Implementations en.srt | 4938 | 2023-09-05 21:07:50 |
| - | 007. 7.6 Exploiting Insecure SUDO Implementations.mp4 | 11556595 | 2023-09-05 21:02:26 |
| - | 008. 7.7 Understanding Ret2libc Attacks en.srt | 4345 | 2023-09-05 21:07:52 |
| - | 008. 7.7 Understanding Ret2libc Attacks.mp4 | 9574762 | 2023-09-05 21:02:27 |
| - | 009. 7.8 Understanding Windows Privileges en.srt | 2698 | 2023-09-05 21:07:53 |
| - | 009. 7.8 Understanding Windows Privileges.mp4 | 5969350 | 2023-09-05 21:02:29 |
| - | 010. 7.9 Surveying Kerberoasting en.srt | 1683 | 2023-09-05 21:07:54 |
| - | 010. 7.9 Surveying Kerberoasting.mp4 | 4136122 | 2023-09-05 21:02:30 |
| - | 011. 7.10 Exploiting Other Windows-based Vulnerabilities en.srt | 9688 | 2023-09-05 21:07:55 |
| - | 011. 7.10 Exploiting Other Windows-based Vulnerabilities.mp4 | 18302821 | 2023-09-05 21:02:33 |
| - | 012. 7.11 Understanding What Are Key Loggers en.srt | 2900 | 2023-09-05 21:07:56 |
| - | 012. 7.11 Understanding What Are Key Loggers.mp4 | 5468387 | 2023-09-05 21:02:34 |
| - | 013. 7.12 Understanding What Are Scheduled Tasks en.srt | 1186 | 2023-09-05 21:07:57 |
| - | 013. 7.12 Understanding What Are Scheduled Tasks.mp4 | 2911568 | 2023-09-05 21:02:35 |
| - | 014. 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks en.srt | 13177 | 2023-09-05 21:07:58 |
| - | 014. 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks.mp4 | 30323037 | 2023-09-05 21:02:39 |
| - | 015. 7.14 Surveying Mobile Device Security en.srt | 16923 | 2023-09-05 21:08:00 |
| - | 015. 7.14 Surveying Mobile Device Security.mp4 | 42617507 | 2023-09-05 21:02:44 |
| - | 016. 7.15 Understanding How to Exploit Physical Security Vulnerabilities en.srt | 7882 | 2023-09-05 21:08:01 |
| - | 016. 7.15 Understanding How to Exploit Physical Security Vulnerabilities.mp4 | 13408950 | 2023-09-05 21:02:46 |