Udemy - Ethical Hacking - A Hands-On Approach to Ethical Hacking

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 5.7 GB
  • Uploaded By CourseClub
  • Downloads 360
  • Last checked 1 week ago
  • Date uploaded 7 years ago
  • Seeders 6
  • Leechers 7

Infohash : 66BAAC155192423CD11B7421E03E9F60883F39DE



Ethical Hacking - A Hands-On Approach to Ethical Hacking

Ethical Hacking - A Complete Hands-On Training on Offensive Ethical Hacking and Penetration Testing Using Kali Linux

For More Courses Visit: https://desirecourse.com

Files:

[DesireCourse.Com] Udemy - Ethical Hacking - A Hands-On Approach to Ethical Hacking 1. Virtual Network Lab Build
  • 1. Start here!.mp4 (35.5 MB)
  • 1. Start here!.vtt (11.0 KB)
  • 2. Video and lab - Creating a Virtual install of Kali Using VMWare.mp4 (17.6 MB)
  • 2. Video and lab - Creating a Virtual install of Kali Using VMWare.vtt (10.3 KB)
  • 2.1 Lab - Creating a Virtual install of Kali using VMWare.html (0.2 KB)
  • 3. Video and lab - Creating a Virtual install of Kali using VirtualBox.mp4 (35.2 MB)
  • 3. Video and lab - Creating a Virtual install of Kali using VirtualBox.vtt (18.6 KB)
  • 3.1 Lab -Creating a Virtual Install of Kali Using VirtualBox.html (0.2 KB)
  • 4. Video and Lab - Installing VirtualBox Guest Additions in Kali.mp4 (125.1 MB)
  • 4. Video and Lab - Installing VirtualBox Guest Additions in Kali.vtt (8.3 KB)
  • 4.1 Lab - Installing VirtualBox Guest Additions in Kali.html (0.2 KB)
  • 5. Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare.mp4 (22.9 MB)
  • 5. Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare.vtt (16.0 KB)
  • 5.1 Lab - Creating an Unattended Virtual Install of XP Using VMWare.html (0.2 KB)
  • 6. Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox.mp4 (24.8 MB)
  • 6. Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox.vtt (8.9 KB)
  • 6.1 Lab - Creating an Unattended Virtual Install of Windows XP Using VirtualBox.html (0.2 KB)
  • 7. Video - Troubleshooting Connectivity Issues With Virtualization.mp4 (31.2 MB)
  • 7. Video - Troubleshooting Connectivity Issues With Virtualization.vtt (9.5 KB)
10. Social Engineering
  • 1. Video and Lab - Using the Social Engineering Toolkit (SET).mp4 (24.8 MB)
  • 1. Video and Lab - Using the Social Engineering Toolkit (SET).vtt (7.9 KB)
  • 1.1 Lab - Harvesting Credentials Using the SET Tool Kit.html (0.2 KB)
11. BASH Scripting for Pentesters
  • 1. Video and Lab - Introduction to BASH Scripting.mp4 (211.3 MB)
  • 1. Video and Lab - Introduction to BASH Scripting.vtt (17.8 KB)
  • 1.1 Lab - Introduction to BASH Scripting.html (0.2 KB)
  • 2. Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports.mp4 (240.1 MB)
  • 2. Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports.vtt (17.4 KB)
  • 2.1 Lab - Creating a BASH Script for Scanning Vulnerable Ports.html (0.2 KB)
  • 3. Lab -Linux BASH Shell Scripting -Task Scheduling.html (0.2 KB)
  • 3.1 Lab - Linux BASH Shell Scripting – Task Scheduling.html (0.2 KB)
12. Password Cracking
  • 1. Video and Lab – Password Cracking Using Medusa.mp4 (11.7 MB)
  • 1. Video and Lab – Password Cracking Using Medusa.vtt (6.4 KB)
  • 1.1 Lab - Password Cracking Using Medusa.html (0.2 KB)
  • 2. Video and Lab - Passwords Cracking Using Mimikatz.mp4 (37.9 MB)
  • 2. Video and Lab - Passwords Cracking Using Mimikatz.vtt (12.2 KB)
  • 2.1 Lab - Cracking Passwords Using Mimikatz.html (0.2 KB)
13. Web Based Application Attacks
  • 1. Video and Lab - Installing w3af in Kali Linux Using Docker.mp4 (211.1 MB)
  • 1. Video and Lab - Installing w3af in Kali Linux Using Docker.vtt (14.4 KB)
  • 1.1 Lab - Installing w3af in Kali Linux.html (0.2 KB)
  • 2. Video and Lab – Conducting A Website Vulnerability Scan Using w3af.mp4 (17.4 MB)
  • 2. Video and Lab – Conducting A Website Vulnerability Scan Using w3af.vtt (6.1 KB)
  • 2.1 Lab – Conducting A Website Vulnerability Scan Using w3af.html (0.2 KB)
  • 3. Video and Lab – Performing a Browser Based Attack.mp4 (36.0 MB)
  • 3. Video and Lab – Performing a Browser Based Attack.vtt (12.9 KB)
  • 3.1 Lab -Performing a Browser Based Attack.html (0.2 KB)
  • 4. Video and lab - SQL Injection Attack Using SQLmap.mp4 (37.2 MB)
  • 4. Video and lab - SQL Injection Attack Using SQLmap.vtt (14.1 KB)
  • 4.1 Lab - SQL Injection Attack Using SQLmap.html (0.2 KB)
14. Browser Exploitation Framework (BeEF)
  • 1. Video and Lab - Configure Kali for Exploitating the WAN.mp4 (188.9 MB)
  • 1. Video and Lab - Configure Kali for Exploitating the WAN.vtt (185.2 MB)
  • 2. Video and lab - The Browser Exploitation Framework (BeEF).mp4 (245.3 MB)
  • 2. Video and lab - The Browser Exploitation Framework (BeEF).vtt (22.0 KB)
  • 2.1 Lab - Browser Exploitation Framework (BeEF) - Client-Side Attacks.html (0.2 KB)
15. Capture the Flag Walkthrough - Mr. Robot
  • 1. Lab file - Capture the Flag (CTF) – Mr. Robot.html (0.2 KB)
  • 2. Video Walk Through -Key #1.mp4 (218.3 MB)
  • 2. Video Walk Through -Key #1.vtt (15.1 KB)
  • 3. Video Walk through - Key #2.mp4 (269.2 MB)
  • 3. Video Walk through - Key #2.vtt (22.2 KB)
  • 4. Video Walk Through - Key #3.mp4 (138.2 MB)
  • 4. Video Walk Through - Key #3.vtt (7.8 KB)
16. Capture the Flag Walkthrough – Stapler
  • 1. Lab File - Walkthrough - CTF – Stapler.html (0.2 KB)
  • 2. Video - Capture the Flag - Stapler Part 1.mp4 (290.8 MB)
  • 2. Video - Capture the Flag - Stapler Part 1.vtt (21.0 KB)
  • 3. Video - Capture the Flag - Stapler Part 2.mp4 (205.4 MB)
  • 3. Video - Capture the Flag - Stapler Part 2.vtt (19.7 KB)
  • 4. Video - Capture the Flag - Stapler Part 3.mp4 (180.7 MB)
  • 4. Video - Capture the Flag - Stapler Part 3.vtt (13.9 KB)
17. Bonus - Digital Forensics Case Management
  • 1. Video - Attaching an External USB Divice in Kali.mp4 (106.7 MB)
  • 1. Video - Attaching an External USB Divice in Kali.vtt (7.7 KB)
  • 2. Video and Lab -Digital Forensics Using Autopsy Part I.mp4 (134.9 MB)
  • 2. Video and Lab -Digital Forensics Using Autopsy Part I.vtt (12.1 KB)
  • 2.1 Lab - Digital Forensics Using Autopsy Part I.html (0.2 KB)
  • 3. Video and Lab - Digital Forensics Using Autopsy Part II.mp4 (97.6 MB)
  • 3. Video and Lab - Digital Forensics Using Autopsy Part II.vtt (8.3 KB)
  • 3.1 Lab - Digital Forensics Using Kali Part II.html (0.2 KB)
  • 4. Subscribe to my Tech blog!.html (0.2 KB)
  • 4.1 Subscribe to my tech blog! Nothing to buy, just a valid email address is all you need!.html (0.1 KB)
2. Optimizing Kali
  • 1. Video and lab - Install Kali Linux Tools Using Katoolin.mp4 (19.0 MB)
  • 1. Video and lab - Install Kali Linux Tools Using Katoolin.vtt (6.5 KB)
  • 1.1 Lab - Install Kali Linux Tools Using Katoolin.html (0.2 KB)
3. Anonymity - Remaining Anonymous While Hacking Online
  • 1. Video and Lab – Remaining Anonymous Online using TOR and Proxychains.mp4 (28.9 MB)
  • 1. Video and Lab – Remaining Anonymous Online using TOR and Proxychains.vtt (11.3 KB)
  • 1.1 Lab – Remaining Anonymous Online using TOR and Proxychains.html (0.2 KB)
  • 2. Video and Lab - Setup a free VPN Using Kali Linux.mp4 (134.9 MB)
  • 2. Video and Lab - Setup a free VPN Using Kali Linux.vtt (10.8 KB)
  • 2.1 Lab - Setup a free VPN using Kali Linux.html (0.2 KB)
  • 3. Video and Lab - Using anonsurf on Kali Linux to Stay Anonymous.mp4 (132.5 MB)
  • 3. Video and Lab - Using anonsurf on Kali Linux to Stay Anonymous.vtt (8.9 KB)
  • 3.1 Lab - Using anonsurf on Kali Linux to Stay Anonymous.html (0.2 KB)
4. Gathering Information - Open-source intelligence (OSINT)
  • 1. Video and Lab - Information Gathering Using Maltego.mp4 (171.0 MB)
  • 1. Video and Lab - Information Gathering Using Maltego.vtt (12.0 KB)
  • 1.1 Lab - Information Gathering Using Maltego.html (0.2 KB)
  • 2. Video and Lab - Information Gathering Using Metagoofil.mp4 (130.4 MB)
  • 2. Video and Lab - Information Gathering Using Metagoofil.vtt (8.3 KB)
  • 2.1 Lab – Information Gathering Using Metagoofil.html (0.2 KB)
  • 3. Video and Lab - Information Gatering Using RECON-NG.mp4 (267.7 MB)
  • 3. Video and Lab - Information Gatering Using RECON-NG.vtt (16.1 KB)
  • 3.1 Lab - Information Gathering Using RECON-NG.html (0.2 KB)
5. Active Reconnaissance
  • 1. Lab - Introduction to Nmap.html (1.9 KB)
  • 1.1 Lab - Introduction to NMAP.html (0.1 KB)
  • 2. Video and lab - Nmap Scripting Engine (NSE).mp4 (55.5 MB)
  • 2. Video and lab - Nmap Scripting Engine (NSE).vtt (18.0 KB)
  • 2.1 Lab - Using the Nmap Scripting Engine (NSE).html (0.2 KB)
  • 3. Video and lab - Scanning for WannaCry Ransomware.mp4 (24.3 MB)
  • 3. Video and lab - Scanning for WannaCry Ransomware.vtt (13.4 KB)
  • 3.1 Lab- Scanning for WannaCry Ransomware.html (0.2 KB)
6. Scanning for Vulnerabilities
  • 1. Video and Lab - Installing NESSUS Using Docker.mp4 (202.6 MB)
  • 1. Video and Lab - Installing NESSUS Using Docker.vtt (17.3 KB)
  • 1.1 Lab - Installing NESSUS Using Docker.html (0.2 KB)
  • 2. Video and lab - Scanning for Vulnerabilities Using Nessus.mp4 (125.1 MB)
  • 2. Video and lab - Scanning for Vulnerabilities Using Nessus.vtt (12.3 KB)
  • 2.1 Lab - Scanning for Vulnerabilities Using Nessus.html (0.2 KB)
  • 3. Video - Using Your Nessus Scan Results.mp4 (44.8 MB)
  • 3. Video - Using Your Nessus Scan Results.vtt (12.7 KB)
  • 4. Video and Lab - Installing OpenVAS Using Docker.mp4 (151.2 MB)
  • 4. Video and Lab - Installing OpenVAS Using Docker.vtt (10.0 KB)
  • 4.1 Lab - Installing OpenVAS Using Docker.html (0.2 KB)
  • 5. Video and Lab - Scanning for Vulverabilites Using OpenVAS.mp4 (123.6 MB)
  • 5. Video and Lab - Scanning for Vulverabilites Using OpenVAS.vtt (11.4 KB)
  • 5.1 Lab - Scanning for Vulnerabilities Using OpenVAS.html (0.2 KB)
7. Exploiting Windows XP
  • 1. Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP.mp4 (161.0 MB)
  • 1. Video and Lab- Using Metasploit to Launch a DOS Attack Against Windows XP.vtt (9.4 KB)
  • 1.1 Lab- Using Metasploit to Launch a DOS Attack Against Windows XP.html (0.2 KB)
  • 2. Video and Lab - Establishing A VNC Shell Using Meterpreter.mp4 (248.6 MB)
  • 2. Video and Lab - Establishing A VNC Shell Using Meterpreter.vtt (20.1 KB)
  • 2.1 Lab - Establishing A VNC Shell Using Meterpreter.html (0.2 KB)
  • 3. Video and Lab - Using Meterpreter to backdoor Windows XP.mp4 (188.2 MB)
  • 3. Video and Lab - Using Meterpreter to backdoor Windows XP.vtt (14.1 KB)
  • 3.1 Lab - Using Meterpreter to backdoor Windows XP.html (0.2 KB)
  • 4. Lab - Exploiting Vulnerable Applications on Windows XP SP2.html (1.8 KB)
  • 4.1 Lab - Exploiting Vulnerable Applications on Windows XP SP2.html (0.2 KB)
  • 5. Lab - Hacking Windows XP via MS11-006 Windows Shell Graphics Processing.html (0.2 KB)
  • 5.1 Lab - Hacking Windows XP via MS11-006 Windows Shell Graphics Processing.html (0.2 KB)
8. NetCat
  • 1. Lab - Using Netcat to Exploit Server 2008.mp4 (194.1 MB)
  • 1. Lab - Using Netcat to Exploit Server 2008.vtt (18.3 KB)
  • 1.1 Lab – Server 2008 Buffer Overflow Attack Using Netcat.html (0.2 KB)
9. Exploiting Linux
  • 1. Video and lab - Installing Metasploitable2 Using VirtualBox.mp4 (28.1 MB)
  • 1. Video and lab - Installing Metasploitable2 Using VirtualBox.vtt (10.3 KB)
  • 1.1 lab - Installing Metasploitable2 Using VirtualBox.html (0.2 KB)
  • 2. Video and lab - Installing Metasploitable2 Using VMWare.mp4 (18.0 MB)
  • 2. Video and lab - Installing Metasploitable2 Using VMWare.vtt (7.0 KB)
  • 2.1 lab - Installing Metasploitable2 Using VMWare.html (0.2 KB)
  • 3. Lab - Learning to Hack Linux Using Metasploitable2.html (1.4 KB)
  • 3.1 Lab - Learning to Hack Linux Using Metasploitable2.html (0.1 KB)
  • 4. Lab - Exploring Endpoint Attacks.html (0.2 KB)
  • 4.1 Lab - Exploring Endpoint Attacks.html (0.1 KB)
  • 5. Video and lab - This is SPARTA!.mp4 (52.6 MB)
  • 5. Video and lab - This is SPARTA!.vtt (19.3 KB)
  • 5.1 Lab - This is SPARTA!.html (0.1 KB)
  • [DesireCourse.Com].txt (0.7 KB)
  • [DesireCourse.Com].url (0.0 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://62.138.0.158:6969/announce
  • udp://87.233.192.220:6969/announce
  • udp://88.198.231.1:1337/announce
  • udp://151.80.120.113:2710/announce
  • udp://111.6.78.96:6969/announce
  • udp://90.179.64.91:1337/announce
  • udp://51.15.4.13:1337/announce
  • udp://191.96.249.23:6969/announce
  • udp://35.187.36.248:1337/announce
  • udp://123.249.16.65:2710/announce
  • udp://127.0.0.1:6969/announce
  • udp://210.244.71.25:6969/announce
  • udp://78.142.19.42:1337/announce
  • udp://173.254.219.72:6969/announce
  • udp://51.15.76.199:6969/announce
  • udp://91.212.150.191:3418/announce
  • udp://103.224.212.222:6969/announce
  • udp://92.241.171.245:6969/announce
  • udp://51.15.40.114:80/announce
  • udp://37.19.5.139:6969/announce
CACHE ❓ RP-FALLBACK 📄 torrent 🕐 07 Feb 2026, 11:08:35 am IST ⏰ 04 Mar 2026, 11:08:35 am IST ✅ Valid for 24d 23h 🔄 Wait 10m