f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives en.srt3212023-09-05 21:07:42
-001. Learning objectives.mp419699092023-09-05 21:02:14
-002. 7.1 Understanding How to Exploit Local Host Vulnerabilities en.srt10882023-09-05 21:07:44
-002. 7.1 Understanding How to Exploit Local Host Vulnerabilities.mp449038522023-09-05 21:02:16
-003. 7.2 Exploiting Insecure Service and Protocol Configurations en.srt54032023-09-05 21:07:45
-003. 7.2 Exploiting Insecure Service and Protocol Configurations.mp4179019612023-09-05 21:02:18
-004. 7.3 Understanding Local Privilege Escalation en.srt42562023-09-05 21:07:46
-004. 7.3 Understanding Local Privilege Escalation.mp4104651912023-09-05 21:02:20
-005. 7.4 Understanding Linux Permissions en.srt69122023-09-05 21:07:47
-005. 7.4 Understanding Linux Permissions.mp4139735012023-09-05 21:02:22
-006. 7.5 Understanding SUID or SGID and Unix Programs en.srt27982023-09-05 21:07:49
-006. 7.5 Understanding SUID or SGID and Unix Programs.mp451708372023-09-05 21:02:24
-007. 7.6 Exploiting Insecure SUDO Implementations en.srt49382023-09-05 21:07:50
-007. 7.6 Exploiting Insecure SUDO Implementations.mp4115565952023-09-05 21:02:26
-008. 7.7 Understanding Ret2libc Attacks en.srt43452023-09-05 21:07:52
-008. 7.7 Understanding Ret2libc Attacks.mp495747622023-09-05 21:02:27
-009. 7.8 Understanding Windows Privileges en.srt26982023-09-05 21:07:53
-009. 7.8 Understanding Windows Privileges.mp459693502023-09-05 21:02:29
-010. 7.9 Surveying Kerberoasting en.srt16832023-09-05 21:07:54
-010. 7.9 Surveying Kerberoasting.mp441361222023-09-05 21:02:30
-011. 7.10 Exploiting Other Windows-based Vulnerabilities en.srt96882023-09-05 21:07:55
-011. 7.10 Exploiting Other Windows-based Vulnerabilities.mp4183028212023-09-05 21:02:33
-012. 7.11 Understanding What Are Key Loggers en.srt29002023-09-05 21:07:56
-012. 7.11 Understanding What Are Key Loggers.mp454683872023-09-05 21:02:34
-013. 7.12 Understanding What Are Scheduled Tasks en.srt11862023-09-05 21:07:57
-013. 7.12 Understanding What Are Scheduled Tasks.mp429115682023-09-05 21:02:35
-014. 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks en.srt131772023-09-05 21:07:58
-014. 7.13 Exploring Sandboxes and Virtual Machine Escape Attacks.mp4303230372023-09-05 21:02:39
-015. 7.14 Surveying Mobile Device Security en.srt169232023-09-05 21:08:00
-015. 7.14 Surveying Mobile Device Security.mp4426175072023-09-05 21:02:44
-016. 7.15 Understanding How to Exploit Physical Security Vulnerabilities en.srt78822023-09-05 21:08:01
-016. 7.15 Understanding How to Exploit Physical Security Vulnerabilities.mp4134089502023-09-05 21:02:46

control-panel