Filename Size 01.Welcome/0101.The Course Overview.mp4 13.4 MB 01.Welcome/0102.How to Get the Most Out of This Course.mp4 12.1 MB 01.Welcome/0103.Teaser Hack Updated Windows10 Using Kali Linux.mp4 46.4 MB 01.Welcome/0104.Kali Linux Basics.mp4 27.4 MB 02.Lab Setup/0201.Download and Install VMware Workstation.mp4 13.6 MB 02.Lab Setup/0202.Download Windows and Kali Linux.mp4 38 MB 02.Lab Setup/0203.Installation of Windows and Kali Linux.mp4 13.8 MB 02.Lab Setup/0204.Update the Kali Linux Operating System.mp4 25.1 MB 03.Terminal Commands/0301.File Commands.mp4 18.9 MB 03.Terminal Commands/0302.Directory Commands.mp4 24 MB 03.Terminal Commands/0303.Chain Commands.mp4 24.1 MB 03.Terminal Commands/0304.Manage Services.mp4 13.5 MB 04.Information Gathering/0401.Using the NetDiscover Tool.mp4 22.4 MB 04.Information Gathering/0402.Using the Nmap Tool.mp4 29.1 MB 04.Information Gathering/0403.Using the Sparta Tool.mp4 15 MB 04.Information Gathering/0404.Using the Maltego Tool.mp4 41.2 MB 04.Information Gathering/0405.Using the Recon-NG Tool.mp4 33.8 MB 05.Vulnerability Analysis/0501.Using the Burp Suite Tool.mp4 42.8 MB 05.Vulnerability Analysis/0502.Using the ZAP Tool.mp4 37.2 MB 05.Vulnerability Analysis/0503.WordPress Scanning Using WPScan.mp4 65.7 MB 05.Vulnerability Analysis/0504.Nessus Installation.mp4 29.7 MB 05.Vulnerability Analysis/0505.Vulnerability Analysis Using Nessus.mp4 41.3 MB 05.Vulnerability Analysis/0506.Analyze the Web Using HTTrack.mp4 33.5 MB 06.Database Hacking/0601.Using the SQLite Tool.mp4 37.9 MB 06.Database Hacking/0602.Using the Sqlmap Tool.mp4 48.4 MB 06.Database Hacking/0603.Using the JSQL Tool.mp4 35 MB 06.Database Hacking/0604.Using SQLsus.mp4 35.8 MB 07.Password Cracking/0701.Using Crunch Commands.mp4 27.8 MB 07.Password Cracking/0702.Using John the Ripper Tool.mp4 24.5 MB 07.Password Cracking/0703.FTP Setup.mp4 36.6 MB 07.Password Cracking/0704.Using Hydra.mp4 45 MB 07.Password Cracking/0705.Using Medusa.mp4 42.3 MB 07.Password Cracking/0706.Using Ncrack.mp4 17.2 MB 08.Man-in-the-Middle AttackSniffing/0801.Using the MAC Changer Tool.mp4 26.5 MB 08.Man-in-the-Middle AttackSniffing/0802.Using the Wireshark Tool.mp4 38.3 MB 08.Man-in-the-Middle AttackSniffing/0803.Using the Ettercap Tool.mp4 31.2 MB 08.Man-in-the-Middle AttackSniffing/0804.Using MITMProxy and Driftnet Tool.mp4 20.2 MB 09.Social Engineering Attack/0901.Phishing Attack Using SET.mp4 36 MB 09.Social Engineering Attack/0902.Trojan Attack Using SET.mp4 42.9 MB 09.Social Engineering Attack/0903.Using the Maltego Tool.mp4 32.2 MB 09.Social Engineering Attack/0904.Using Browser Exploitation Framework.mp4 29.3 MB 10.Wireless Hacking/1001.About Wireless Adapter.mp4 15.7 MB 10.Wireless Hacking/1002.Start Monitor Mode.mp4 21.9 MB 10.Wireless Hacking/1003.Hack WEP Using the Fern Tool.mp4 34.2 MB 10.Wireless Hacking/1004.Create a Dictionary.mp4 14.5 MB 10.Wireless Hacking/1005.Hack WPAWPA2WPA2-PSK.mp4 23.2 MB 11.Exploitation Techniques/1101.Metasploit Basics.mp4 34.3 MB 11.Exploitation Techniques/1102.AV Bypass Frameworks.mp4 25.3 MB 11.Exploitation Techniques/1103.Bypass Target Defender.mp4 28.5 MB 11.Exploitation Techniques/1104.Bypass Target Antivirus.mp4 33.1 MB 12.Post-Exploitation Techniques/1201.Meterpreter Commands.mp4 47.2 MB 12.Post-Exploitation Techniques/1202.Insert Keylogger.mp4 14.7 MB 12.Post-Exploitation Techniques/1203.Privilege Escalation.mp4 22.6 MB 12.Post-Exploitation Techniques/1204.Stealing Login Credentials.mp4 24.5 MB 13.Reporting/1301.Using Leafpad.mp4 11 MB 13.Reporting/1302.Using CutyCapt.mp4 21.6 MB 13.Reporting/1303.Using Faraday IDE.mp4 17 MB 13.Reporting/1304.Using recordMyDesktop.mp4 20.5 MB