11. Gaining Access - Client Side Attacks/4. Generating An Undetectable Backdoor Using Veil 3.mp420.76MB
11. Gaining Access - Client Side Attacks/5. Listening For Incoming Connections.mp412.47MB
11. Gaining Access - Client Side Attacks/6. Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp415.96MB
11. Gaining Access - Client Side Attacks/7. Backdoor Delivery Method 1 - Using a Fake Update.mp422.8MB
11. Gaining Access - Client Side Attacks/8. Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.mp421.94MB
11. Gaining Access - Client Side Attacks/9. How to Protect Yourself From The Discussed Delivery Methods.mp411.29MB
12. Gaining Access - Client Side Attacks - Social Engineering/10. Spoofing Emails - Send Emails As Any Email Account You Want.mp418.77MB
12. Gaining Access - Client Side Attacks - Social Engineering/11. BeEF Overview & Basic Hook Method.mp418.9MB
12. Gaining Access - Client Side Attacks - Social Engineering/12. BeEF - hooking targets using MITMf.mp48.68MB
12. Gaining Access - Client Side Attacks - Social Engineering/13. BeEF - Running Basic Commands On Target.mp411.45MB
12. Gaining Access - Client Side Attacks - Social Engineering/14. BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.mp45.66MB
12. Gaining Access - Client Side Attacks - Social Engineering/15. BeEF - Gaining Full Control Over Windows Target.mp48.61MB
12. Gaining Access - Client Side Attacks - Social Engineering/16. Detecting Trojans Manually.mp415.09MB
12. Gaining Access - Client Side Attacks - Social Engineering/17. Detecting Trojans Using a Sandbox.mp412.08MB
12. Gaining Access - Client Side Attacks - Social Engineering/1. Introduction.mp47.2MB
12. Gaining Access - Client Side Attacks - Social Engineering/2. Maltego Basics.mp471.06MB
12. Gaining Access - Client Side Attacks - Social Engineering/3. Discovering Websites, Links & Social Networking Accounts Associated With Target.mp422.62MB
12. Gaining Access - Client Side Attacks - Social Engineering/4. Discovering Twitter Friends & Associated Accounts.mp415.3MB
12. Gaining Access - Client Side Attacks - Social Engineering/5. Discovering Emails Of The Target's Friends.mp413.14MB
12. Gaining Access - Client Side Attacks - Social Engineering/6. Analysing The Gathered Info & Building An Attack Strategy.mp426.49MB
12. Gaining Access - Client Side Attacks - Social Engineering/7. Backdooring Any File Type (images, pdf's ...etc).mp412.77MB
12. Gaining Access - Client Side Attacks - Social Engineering/8. Compiling & Changing Trojan's Icon.mp416.42MB
12. Gaining Access - Client Side Attacks - Social Engineering/9. Spoofing .exe Extension To Any Extension (jpg, pdf ...etc).mp419.31MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/1. Overview of the Setup.mp417.29MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/2. Ex1 - Generating a Backdoor That Works Outside The Network.mp415.43MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/3. Configuring The Router To Forward Connections To Kali.mp418.82MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/4. Ex2 - Using BeEF Outside The Network.mp415.22MB
14. Post Exploitation/1. Introduction.mp45.48MB
14. Post Exploitation/2. Meterpreter Basics.mp415.23MB
14. Post Exploitation/3. File System Commands.mp412.99MB
14. Post Exploitation/4. Maintaining Access - Basic Methods.mp412.88MB
14. Post Exploitation/5. Maintaining Access - Using a Reliable & Undetectable Method.mp418.35MB
6. Network Penetration Testing - Gaining Access (WEPWPAWPA2 Cracking)/11. WPA Cracking - Using a Wordlist Attack.mp47.63MB
6. Network Penetration Testing - Gaining Access (WEPWPAWPA2 Cracking)/13. How to Configure Wireless Security Settings To Secure Your Network.mp411.84MB