Udemy - Learn Ethical Hacking From Scratch [Desire Course]

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 8.4 GB
  • Uploaded By CourseClub
  • Downloads 747
  • Last checked 1 day ago
  • Date uploaded 6 years ago
  • Seeders 14
  • Leechers 10

Infohash : 5A3C520A2F34FF531D16416116714EB593B1492F



Learn Ethical Hacking From Scratch

Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts.

For More Courses Visit: https://desirecourse.net

Files:

[DesireCourse.Net] Udemy - Learn Ethical Hacking From Scratch 1. Introduction
  • 1. Course Introduction & Overview.mp4 (58.3 MB)
  • 1. Course Introduction & Overview.vtt (3.6 KB)
  • 2. Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam.mp4 (84.7 MB)
  • 2. Teaser - Hacking a Windows 10 Computer & Accessing Their Webcam.vtt (9.3 KB)
  • 3. What Is Hacking & Why Learn It .mp4 (68.1 MB)
  • 3. What Is Hacking & Why Learn It .vtt (4.2 KB)
10. Gaining Access - Server Side Attacks
  • 1. Installing Metasploitable As a Virtual Machine.mp4 (101.3 MB)
  • 1. Installing Metasploitable As a Virtual Machine.vtt (7.2 KB)
  • 1.1 Metasploitable Download Page.html (0.1 KB)
  • 2. Introduction.mp4 (62.6 MB)
  • 2. Introduction.vtt (4.8 KB)
  • 2.1 Gaining Access - Server Side Attacks.pdf.pdf (168.9 KB)
  • 3. Basic Information Gathering & Exploitation.mp4 (93.4 MB)
  • 3. Basic Information Gathering & Exploitation.vtt (11.7 KB)
  • 4. Using a Basic Metasploit Exploit.mp4 (80.9 MB)
  • 4. Using a Basic Metasploit Exploit.vtt (8.8 KB)
  • 5. Exploiting a Code Execution Vulnerability.mp4 (76.1 MB)
  • 5. Exploiting a Code Execution Vulnerability.vtt (11.4 KB)
  • 6. Nexpose - Installing Nexpose.mp4 (120.0 MB)
  • 6. Nexpose - Installing Nexpose.vtt (9.9 KB)
  • 6.1 nexpose-rolling-hack.txt.txt (0.4 KB)
  • 6.2 Use This Link To Get a Temporary Email Address To Use With Nexpose.html (0.1 KB)
  • 6.3 Nexpose Download Page.html (0.1 KB)
  • 6.4 Nexpose Download Page - Alternative Link.html (0.1 KB)
  • 7. Nexpose - How To Configure & Launch a Scan.mp4 (61.9 MB)
  • 7. Nexpose - How To Configure & Launch a Scan.vtt (10.3 KB)
  • 8. Nexpose - Analysing Scan Results & Generating Reports.mp4 (78.7 MB)
  • 8. Nexpose - Analysing Scan Results & Generating Reports.vtt (9.0 KB)
11. Gaining Access - Client Side Attacks
  • 1. Introduction.mp4 (38.9 MB)
  • 1. Introduction.vtt (2.9 KB)
  • 1.1 Gaining Access - Client Side Attacks.pdf.pdf (187.5 KB)
  • 2. Installing Veil 3.1.mp4 (41.6 MB)
  • 2. Installing Veil 3.1.vtt (7.1 KB)
  • 2.1 Veil Framework Github Repo.html (0.1 KB)
  • 3. Veil Overview & Payloads Basics.mp4 (13.5 MB)
  • 3. Veil Overview & Payloads Basics.vtt (8.8 KB)
  • 4. Generating An Undetectable Backdoor Using Veil 3.mp4 (20.8 MB)
  • 4. Generating An Undetectable Backdoor Using Veil 3.vtt (11.3 KB)
  • 4.1 Alternative to Nodistribute.html (0.1 KB)
  • 4.2 Nodistribute - Online Virus Scanner.html (0.1 KB)
  • 4.3 Another way of generating an undetectable backdoor.html (0.1 KB)
  • 5. Listening For Incoming Connections.mp4 (12.5 MB)
  • 5. Listening For Incoming Connections.vtt (8.0 KB)
  • 6. Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp4 (16.0 MB)
  • 6. Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.vtt (8.3 KB)
  • 7. Backdoor Delivery Method 1 - Using a Fake Update.mp4 (142.2 MB)
  • 7. Backdoor Delivery Method 1 - Using a Fake Update.vtt (13.6 KB)
  • 7.1 evilgrade.zip.zip (15.6 MB)
  • 7.2 evilgrade-installation-steps-updated.txt.txt (0.7 KB)
  • 8. Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.mp4 (147.6 MB)
  • 8. Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.vtt (12.4 KB)
  • 8.1 flushiptables.sh.sh (0.2 KB)
  • 8.2 install_bdfproxy.sh.sh (0.2 KB)
  • 8.3 payloads.txt.txt (0.3 KB)
  • 9. How to Protect Yourself From The Discussed Delivery Methods.mp4 (60.8 MB)
  • 9. How to Protect Yourself From The Discussed Delivery Methods.vtt (4.3 KB)
  • 9.1 WinMD5 Download Page.html (0.1 KB)
12. Gaining Access - Client Side Attacks - Social Engineering
  • 1. Introduction.mp4 (49.1 MB)
  • 1. Introduction.vtt (3.5 KB)
  • 10. Spoofing Emails - Setting Up am SMTP Server.mp4 (85.9 MB)
  • 10. Spoofing Emails - Setting Up am SMTP Server.vtt (8.8 KB)
  • 11. Email Spoofing - Sending Emails as Any Email Account.mp4 (139.4 MB)
  • 11. Email Spoofing - Sending Emails as Any Email Account.vtt (14.6 KB)
  • 12. BeEF Overview & Basic Hook Method.mp4 (148.5 MB)
  • 12. BeEF Overview & Basic Hook Method.vtt (12.6 KB)
  • 13. BeEF - Hooking Targets Using Bettercap.mp4 (85.6 MB)
  • 13. BeEF - Hooking Targets Using Bettercap.vtt (7.2 KB)
  • 13.1 inject_beef.js.js (0.1 KB)
  • 14. BeEF - Running Basic Commands On Target.mp4 (46.2 MB)
  • 14. BeEF - Running Basic Commands On Target.vtt (5.1 KB)
  • 16. BeEF - Gaining Full Control Over Windows Target.mp4 (36.6 MB)
  • 16. BeEF - Gaining Full Control Over Windows Target.vtt (4.0 KB)
  • 17. Detecting Trojans Manually.mp4 (80.8 MB)
  • 17. Detecting Trojans Manually.vtt (5.7 KB)
  • 18. Detecting Trojans Using a Sandbox.mp4 (44.1 MB)
  • 18. Detecting Trojans Using a Sandbox.vtt (3.4 KB)
  • 18.1 Hybrid Analysis.html (0.1 KB)
  • 2. Maltego Basics.mp4 (71.0 MB)
  • 2. Maltego Basics.vtt (6.9 KB)
  • 2.1 How to fix Maltego if its not starting.html (0.1 KB)
  • 4. Discovering Twitter Friends & Associated Accounts.mp4 (15.3 MB)
  • 4. Discovering Twitter Friends & Associated Accounts.vtt (5.8 KB)
  • 5. Discovering Emails Of The Target's Friends.mp4 (13.2 MB)
  • 5. Discovering Emails Of The Target's Friends.vtt (3.9 KB)
  • 6. Analysing The Gathered Info & Building An Attack Strategy.mp4 (26.5 MB)
  • 6. Analysing The Gathered Info & Building An Attack Strategy.vtt (10.1 KB)
  • 7. Backdooring Any File Type (images, pdf's ...etc).mp4 (12.8 MB)
  • 7. Backdooring Any File Type (images, pdf's ...etc).vtt (5.5 KB)
  • 7.1 autoit-download-and-execute.txt.txt (0.5 KB)
  • 8. Compiling & Changing Trojan's Icon.mp4 (16.4 MB)
  • 8. Compiling & Changing Trojan's Icon.vtt (7.3 KB)
  • 9. Spoofing .exe Extension To Any Extension (jpg, pdf ...etc).mp4 (19.3 MB)
  • 9. Spoofing .exe Extension To Any Extension (jpg, pdf ...etc).vtt (9.6 KB)
13. Gaining Access - Using The Above Attacks Outside The Local Network
  • 1. Overview of the Setup.mp4 (104.0 MB)
  • 1. Overview of the Setup.vtt (7.8 KB)
  • 4. Ex2 - Using BeEF Outside The Network.mp4 (78.8 MB)
  • 4. Ex2 - Using BeEF Outside The Network.vtt (6.1 KB)
14. Post Exploitation
  • 1. Introduction.mp4 (38.1 MB)
  • 1. Introduction.vtt (2.5 KB)
  • 1.1 Post Exploitation.pdf.pdf (304.3 KB)
  • 2. Meterpreter Basics.mp4 (58.1 MB)
  • 2. Meterpreter Basics.vtt (6.9 KB)
  • 3. File System Commands.mp4 (42.2 MB)
  • 3. File System Commands.vtt (4.7 KB)
  • 4. Maintaining Access - Basic Methods.mp4 (50.2 MB)
  • 4. Maintaining Access - Basic Methods.vtt (5.9 KB)
  • 5. Maintaining Access - Using a Reliable & Undetectable Method.mp4 (71.2 MB)
  • 5. Maintaining Access - Using a Reliable & Undetectable Method.vtt (7.0 KB)
  • 6. Spying - Capturing Key Strikes & Taking Screen Shots.mp4 (20.8 MB)
  • 6. Spying - Capturing Key Strikes & Taking Screen Shots.vtt (2.9 KB)
  • 7. Pivoting - Theory (What is Pivoting).mp4 (109.0 MB)
  • 7. Pivoting - Theory (What is Pivoting).vtt (7.0 KB)
  • 8. Pivoting - Exploiting Devices on The Same Network As The Target Computer.mp4 (71.2 MB)
  • 8. Pivoting - Exploiting Devices on The Same Network As The Target Computer.vtt (8.4 KB)
15. Website Hacking
  • 1. Introduction - What Is A Website .mp4 (68.7 MB)
  • 1. Introduction - What Is A Website .vtt (4.9 KB)
  • 1.1 Web Application Penetration Testing.pdf.pdf (592.7 KB)
  • 2. How To Hack a Website.mp4 (55.8 MB)
  • 2. How To Hack a Website.vtt (4.1 KB)
16. Website Hacking - Information Gathering
  • 1. Gathering Basic Information Using Whois Lookup.mp4 (77.4 MB)
  • 1. Gathering Basic Information Using Whois Lookup.vtt (6.5 KB)
  • 1.1 Domaintools Whois Lookup Page.html (0.1 KB)
  • 2. Discovering Technologies Used On The Website.mp4 (76.2 MB)
  • 2. Discovering Technologies Used On The Website.vtt (6.7 KB)
  • 2.1 Netcraft.html (0.1 KB)
  • 3. Gathering Comprehensive DNS Information.mp4 (106.5 MB)
  • 3. Gathering Comprehensive DNS Information.vtt (11.1 KB)
  • 3.1 robtex.com.html (0.1 KB)
  • 4. Discovering Websites On The Same Server.mp4 (48.7 MB)
  • 4. Discovering Websites On The Same Server.vtt (4.1 KB)
  • 5. Discovering Subdomains.mp4 (55.5 MB)
  • 5. Discovering Subdomains.vtt (5.9 KB)
  • 6. Discovering Sensitive Files.mp4 (72.2 MB)
  • 6. Discovering Sensitive Files.vtt (8.0 KB)
  • 7. Analysing Discovered Files.mp4 (32.7 MB)
  • 7. Analysing Discovered Files.vtt (4.7 KB)
17. Website Hacking - File Upload, Code Execution & File Inclusion Vulns
  • 2.1 code-execution-reverse-shell-commands.txt.txt (10.9 KB)
  • 6. Preventing The Above Vulnerabilities.mp4 (89.2 MB)
  • 6. Preventing The Above Vulnerabilities.vtt (8.3 KB)
18. Website Hacking - SQL Injection Vulnerabilities
  • 1. What is SQL.mp4 (52.5 MB)
  • 1. What is SQL.vtt (6.7 KB)
  • 1.1 Fix table metasploit.accounts doesn't exist issue.html (0.1 KB)
  • 10. Discovering SQL Injections & Extracting Data Using SQLmap.mp4 (80.9 MB)
  • 10. Discovering SQL Injections & Extracting Data Using SQLmap.vtt (7.4 KB)
  • 11. The Right Way To Prevent SQL Injection.mp4 (62.8 MB)
  • 11. The Right Way To Prevent SQL Injection.vtt (5.4 KB)
  • 2. Dangers of SQL Injection Vulnerabilities.mp4 (41.5 MB)
  • 2. Dangers of SQL Injection Vulnerabilities.vtt (3.5 KB)
  • 3. Discovering SQL injections In POST.mp4 (91.8 MB)
  • 3. Discovering SQL injections In POST.vtt (9.3 KB)
  • 4. Bypassing Logins Using SQL injection Vulnerability.mp4 (47.6 MB)
  • 4. Bypassing Logins Using SQL injection Vulnerability.vtt (5.9 KB)
  • 5. Discovering SQL injections in GET.mp4 (71.4 MB)
  • 5. Discovering SQL injections in GET.vtt (7.8 KB)
  • 6. Reading Database Information.mp4 (48.4 MB)
  • 6. Reading Database Information.vtt (5.4 KB)
  • 7. Finding Database Tables.mp4 (29.9 MB)
  • 7. Finding Database Tables.vtt (3.1 KB)
  • 8. Extracting Sensitive Data Such As Passwords.mp4 (38.8 MB)
  • 8. Extracting Sensitive Data Such As Passwords.vtt (4.4 KB)
19. Website Hacking - Cross Site Scripting Vulnerabilities
  • 1. Introduction - What is XSS or Cross Site Scripting.mp4 (48.6 MB)
  • 1. Introduction - What is XSS or Cross Site Scripting.vtt (3.4 KB)
  • 2. Discovering Reflected XSS.mp4 (42.3 MB)
  • 2. Discovering Reflected XSS.vtt (3.5 KB)
  • 3. Discovering Stored XSS.mp4 (41.1 MB)
  • 3. Discovering Stored XSS.vtt (3.4 KB)
  • 4. Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF.mp4 (89.3 MB)
  • 4. Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF.vtt (5.7 KB)
  • 5. Preventing XSS Vulnerabilities.mp4 (53.3 MB)
  • 5. Preventing XSS Vulnerabilities.vtt (6.1 KB)
2. Setting up The Lab
  • 1. Lab Overview & Needed Software.mp4 (106.5 MB)
  • 1. Lab Overview & Needed Software.vtt (8.5 KB)
  • 1.1 Virtual Box Download Page.html (0.1 KB)
  • 1.2 The lab.pdf.pdf (195.6 KB)
  • 2. Installing Kali 2019 As a Virtual Machine.mp4 (156.1 MB)
  • 2. Installing Kali 2019 As a Virtual Machine.vtt (13.6 KB)
  • 2.1 Installing Kali Using ISO (use this method to install it as a MAIN machine)..html (0.1 KB)
  • 2.2 How To Fix Missing Nat Network Issue.html (0.1 KB)
  • 2.3 Kali Virtual Images Download Page.html (0.1 KB)
  • 2.4 How To Fix Blank Screen When Starting Kali.html (0.2 KB)
  • 3. Creating & Using Snapshots.mp4 (89.4 MB)
  • 3. Creating & Using Snapshots.vtt (7.0 KB)
20. Website Hacking - Discovering Vulnerabilities Automatically Using OWASP ZAP
  • 2. Analysing Scan Results.mp4 (44.0 MB)
  • 2. Analysing Scan Results.vtt (4.2 KB)
21. Bonus Section
  • 1. Bonus Lecture - What's Next.html (7.5 KB)
3. Linux Basics
  • 1. Basic Overview of Kali Linux.mp4 (107.5 MB)
  • 1. Basic Overview of Kali Linux.vtt (6.5 KB)
  • 1.1 Best USB Wireless (WiFi) Adapters For Hacking.html (0.2 KB)
  • 2. The Terminal & Linux Commands.mp4 (223.4 MB)
  • 2. The Terminal & Linux Commands.vtt (12.5 KB)
  • 2.1 Linux Commands List.html (0.1 KB)
4. Network Hacking
  • 1. Network Penetration Testing Introduction.mp4 (52.1 MB)
  • 1. Network Penetration Testing Introduction.vtt (2.9 KB)
  • 2. Networks Basics.mp4 (67.4 MB)
  • 2. Networks Basics.vtt (4.4 KB)
  • 2.1 Networks - Pre Connection Attacks.pdf.pdf (1.1 MB)
  • 3. Connecting a Wireless Adapter To Kali.mp4 (71.1 MB)
  • 3. Connecting a Wireless Adapter To Kali.vtt (5.9 KB)
  • 3.1 Virtual Box Extension Pack Download Page.html (0.1 KB)
  • 3.2 Website That Sells Supported Wireless Adapters.html (0.1 KB)
  • 3.3 Best USB Wireless (WiFi) Adapters For Hacking.html (0.1 KB)
  • 4. What is MAC Address & How To Change It.mp4 (97.0 MB)
  • 4. What is MAC Address & How To Change It.vtt (8.3 KB)
  • 4.1 How to prevent mac from reverting back to the original one.html (0.1 KB)
  • 5. Wireless Modes (Managed & Monitor).mp4 (50.3 MB)
  • 5. Wireless Modes (Managed & Monitor).vtt (7.5 KB)
  • 5.1 Best USB Wireless (WiFi) Adapters For Hacking.html (0.1 KB)
  • 5.2 Another Method to Enable Monitor Mode.html (0.1 KB)
5. Network Hacking - Pre Connection Attacks
  • 1. Packet Sniffing Basics Using Airodump-ng.mp4 (41.4 MB)
  • 1. Packet Sniffing Basics Using Airodump-ng.vtt (7.3 KB)
  • 1.1 Networks Pre-Connection Attacks.pdf.pdf (156.7 KB)
  • 2. WiFi Bands - 2.4Ghz & 5Ghz Frequencies.mp4 (49.6 MB)
  • 2. WiFi Bands - 2.4Ghz & 5Ghz Frequencies.vtt (8.7 KB)
  • 3. Targeted Packet Sniffing Using Airodump-ng.mp4 (55.4 MB)
  • 3. Targeted Packet Sniffing Using Airodump-ng.vtt (11.5 KB)
  • 4. Deauthentication Attack (Disconnecting Any Device From The Network).mp4 (62.6 MB)
  • 4. Deauthentication Attack (Disconnecting Any Device From The Network).vtt (7.6 KB)
6. Network Hacking - Gaining Access (WEPWPAWPA2 Cracking)
  • 1. Gaining Access Introduction.mp4 (25.2 MB)
  • 1. Gaining Access Introduction.vtt (1.3 KB)
  • 1.1 Network Hacking - Gaining Access.pdf.pdf (782.1 KB)
  • 10. WPAWPA2 Cracking - Using a Wordlist Attack.mp4 (58.9 MB)
  • 10. WPAWPA2 Cracking - Using a Wordlist Attack.vtt (7.2 KB)
  • 11. Securing Your Network From The Above Attacks.html (2.8 KB)
  • 2. WEP Cracking - Theory Behind Cracking WEP Encryption.mp4 (86.9 MB)
  • 2. WEP Cracking - Theory Behind Cracking WEP Encryption.vtt (6.2 KB)
  • 3. WEP Cracking - Basic Case.mp4 (46.8 MB)
  • 3. WEP Cracking - Basic Case.vtt (7.2 KB)
  • 4. WEP Cracking - Fake Authentication.mp4 (55.2 MB)
  • 4. WEP Cracking - Fake Authentication.vtt (7.5 KB)
  • 5. WEP Cracking - ARP Request Replay Attack.mp4 (60.4 MB)
  • 5. WEP Cracking - ARP Request Replay Attack.vtt (6.7 KB)
  • 6. WPAWPA2 Cracking - Introduction.mp4 (54.1 MB)
  • 6. WPAWPA2 Cracking - Introduction.vtt (3.8 KB)
  • 7. WPAWPA2 Cracking - Exploiting WPS Feature.mp4 (60.8 MB)
  • 7. WPAWPA2 Cracking - Exploiting WPS Feature.vtt (11.6 KB)
  • 7.1 Reaver Download Link.html (0.1 KB)
  • 8. WPAWPA2 Cracking - How To Capture The Handshake.mp4 (46.3 MB)
  • 8. WPAWPA2 Cracking - How To Capture The Handshake.vtt (7.9 KB)
  • 9. WPAWPA2 Cracking - Creating a Wordlist.mp4 (75.8 MB)
  • 9. WPAWPA2 Cracking - Creating a Wordlist.vtt (8.4 KB)
  • 9.1 Some-Links-To-Wordlists.txt.txt (0.4 KB)
7. Network Hacking - Post Connection Attacks
  • 1. Introduction.mp4 (46.4 MB)
  • 1. Introduction.vtt (2.5 KB)
  • 1.1 Post Connection Attacks.pdf.pdf (1.3 MB)
  • 11. MITM - Creating Custom Spoofing Script.mp4 (106.1 MB)
  • 11. MITM - Creating Custom Spoofing Script.vtt (10.1 KB)
  • 12. MITM - Understanding HTTPS & How to Bypass it.mp4 (93.5 MB)
  • 12. MITM - Understanding HTTPS & How to Bypass it.vtt (5.9 KB)
  • 12.1 hstshijack.zip.zip (13.7 KB)
  • 13. MITM - Bypassing HTTPS.mp4 (86.1 MB)
  • 13. MITM - Bypassing HTTPS.vtt (7.6 KB)
  • 14. MITM - Bypassing HSTS.mp4 (154.2 MB)
  • 14. MITM - Bypassing HSTS.vtt (11.2 KB)
  • 14.1 How To Fix the dial tcp error.html (0.1 KB)
  • 14.2 Bettercap V2.23 Download Link.html (0.1 KB)
  • 15. MITM - DNS Spoofing.mp4 (126.6 MB)
  • 15. MITM - DNS Spoofing.vtt (11.4 KB)
  • 16. MITM - Injecting Javascript Code.mp4 (138.4 MB)
  • 16. MITM - Injecting Javascript Code.vtt (11.3 KB)
  • 16.1 alert.js.js (0.0 KB)
  • 17. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4 (119.5 MB)
  • 17. Wireshark - Basic Overview & How To Use It With MITM Attacks.vtt (10.5 KB)
  • 18. Wireshark - Sniffing & Analysing Data.mp4 (83.5 MB)
  • 18. Wireshark - Sniffing & Analysing Data.vtt (6.8 KB)
  • 19. Wireshark - Using Filters, Tracing & Dissecting Packets.mp4 (82.7 MB)
  • 19. Wireshark - Using Filters, Tracing & Dissecting Packets.vtt (6.8 KB)
  • 2. Installing Windows As a Virtual Machine.mp4 (51.6 MB)
  • 2. Installing Windows As a Virtual Machine.vtt (4.3 KB)
  • 2.1 Windows Virtual Machines Download Page.html (0.1 KB)
  • 21. Creating a Fake Access Point (Honeypot) - Theory.mp4 (144.2 MB)
  • 21. Creating a Fake Access Point (Honeypot) - Theory.vtt (13.0 KB)
  • 21.1 Best Wireless Adapters For Hacking.html (0.1 KB)
  • 21.2 install-mana.sh.sh (0.4 KB)
  • 22. Creating a Fake Access Point (Honeypot) - Practical.mp4 (97.1 MB)
  • 22. Creating a Fake Access Point (Honeypot) - Practical.vtt (10.5 KB)
  • 3. Information Gathering - Discovering Connected Clients using netdiscover.mp4 (76.0 MB)
  • 3. Information Gathering - Discovering Connected Clients using netdiscover.vtt (9.3 KB)
  • 4. Gathering More Information Using Zenmap.mp4 (52.0 MB)
  • 4. Gathering More Information Using Zenmap.vtt (8.0 KB)
  • 5. Gathering Even More Information Using Zenmap.mp4 (63.3 MB)
  • 5. Gathering Even More Information Using Zenmap.vtt (9.4 KB)
  • 6. MITM - ARP Poisoning Theory.mp4 (139.6 MB)
  • 6. MITM - ARP Poisoning Theory.vtt (9.2 KB)
  • 7. MITM - ARP Spoofing using arpspoof.mp4 (64.3 MB)
  • 7. MITM - ARP Spoofing using arpspoof.vtt (6.6 KB)
  • 8. MITM - Bettercap Basics.mp4 (67.0 MB)
  • 8. MITM - Bettercap Basics.vtt (8.9 KB)
  • 9. MITM - ARP Spoofing Using Bettercap.mp4 (81.3 MB)
  • 9. MITM - ARP Spoofing Using Bettercap.vtt (8.5 KB)
8. Network Hacking - Detection & Security
  • 1. Detecting ARP Poisoning Attacks.mp4 (76.2 MB)
  • 1. Detecting ARP Poisoning Attacks.vtt (5.8 KB)
  • 1.1 Xarp Download Page.html (0.1 KB)
  • 2. Detecting suspicious Activities In The Network.mp4 (86.9 MB)
  • 2. Detecting suspicious Activities In The Network.vtt (6.1 KB)
  • 3. Preventing MITM Attacks - Method 1.mp4 (88.6 MB)
  • 3. Preventing MITM Attacks - Method 1.vtt (9.7 KB)
  • 4. Preventing MITM Attacks - Method 2.mp4 (140.9 MB)
  • 4. Preventing MITM Attacks - Method 2.vtt (12.1 KB)
  • 4.1 ZSVPN - our own VPN service.html (0.1 KB)
9. Gaining Access To Computer Devices
  • 1. Gaining Access Introduction.mp4 (80.9 MB)
  • 1. Gaining Access Introduction.vtt (5.1 KB)
  • [CourseClub.Me].url (0.0 KB)
  • [DesireCourse.Net].url (0.0 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • http://0d.kebhana.mx:443/announce
  • udp://tw.opentracker.ga:36920/announce
  • udp://temp1.opentracker.gq:6969/announce
  • udp://temp2.opentracker.gq:6969/announce
  • udp://tracker.torrent.eu.org:451/announce
  • http://torrent.nwps.ws:80/announce
  • udp://explodie.org:6969/announce
  • https://opentracker.xyz:443/announce
  • https://t.quic.ws:443/announce
  • https://tracker.fastdownload.xyz:443/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://tracker.coppersurfer.tk:6969/announce
  • udp://tracker.justseed.it:1337/announce
  • udp://open.demonii.si:1337/announce
GDRIVE-CACHE 📁 GD (hit) | ID: 1hdknaao9O... 📄 torrent 🕐 09 Jan 2026, 05:35:31 am IST ⏰ 03 Feb 2026, 05:35:28 am IST ✅ Valid for 17d 15h 🔄 Refresh Cache