Udemy - How To Hack The Box To Your OSCP (Part 3)
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size3.3 GB
- Uploaded Byfreecoursewb
- Downloads42
- Last checkedApr. 11th '22
- Date uploadedApr. 08th '22
- Seeders 8
- Leechers9
Infohash : E87D74EB10A3828EF079C021C92D597DC6E2626B
How To Hack The Box To Your OSCP (Part 3)
https://DevCourseWeb.com
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.31 GB | Duration: 5h 20m
Master over 50 tactics, techniques and procedures, used by Red Teams and bad actors, all mapped to MITRE ATT&CK.
What you'll learn
How modern adversaries breach public facing webservers
How to weoponize benign applications with exploits
How to evade AV and EDR with advanced shellcode loaders
How attackers move laterally, create reverse tunnels and expand influence on the victim network
How to think in terms of MITRE ATT&CK and understand the vernacular.
How to test and validate SQLi, XSS, SSTI and more
Requirements
Hack The Box VIP Account
Description
Are you ready to level up your game?
Files:
[ DevCourseWeb.com ] Udemy - How To Hack The Box To Your OSCP (Part 3)- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 01 - Press Play
- 001 How To Get Started.mp4 (19.7 MB)
- 001 How To Get Started_en.vtt (1.8 KB)
- 002 MITRE ATT&CK Enterprise Matrix.mp4 (53.7 MB)
- 002 MITRE ATT&CK Enterprise Matrix_en.vtt (5.1 KB)
- external-assets-links.txt (0.0 KB)
- 001 (T1082) PING + NMAP.mp4 (57.7 MB)
- 001 (T1082) PING + NMAP_en.vtt (6.2 KB)
- 002 (T1592) RPC.mp4 (91.8 MB)
- 002 (T1592) RPC_en.vtt (8.8 KB)
- 003 SMB.mp4 (53.7 MB)
- 003 SMB_en.vtt (5.5 KB)
- 004 Web.mp4 (322.8 MB)
- 004 Web_en.vtt (37.7 KB)
- 40287156--T1082-PING-NMAP.txt (0.1 KB)
- 40291992--T1592-RPC.txt (0.2 KB)
- 40292568-SMB.txt (0.3 KB)
- 40304922-Web.txt (0.9 KB)
- 001 (T1203) SQLi + Reflected XSS.mp4 (70.2 MB)
- 001 (T1203) SQLi + Reflected XSS_en.vtt (11.4 KB)
- 002 (T1059.003) SSTI.mp4 (118.2 MB)
- 002 (T1059.003) SSTI_en.vtt (13.1 KB)
- 003 (T1059.001) RCE Powershell.mp4 (96.6 MB)
- 003 (T1059.001) RCE Powershell_en.vtt (9.2 KB)
- 004 Windows Reverse Shell Upgrade.mp4 (117.4 MB)
- 004 Windows Reverse Shell Upgrade_en.vtt (13.9 KB)
- 005 (T1105) RCE Netcat.mp4 (62.9 MB)
- 005 (T1105) RCE Netcat_en.vtt (7.4 KB)
- 40314040--T1203-SQLi-XSS.txt (0.1 KB)
- 40378418--T1059-003-SSTI.txt (0.2 KB)
- 40384928--T1059-001-RCE-Powershell.txt (1.0 KB)
- 40394236-Shell-Upgrade.txt (0.3 KB)
- 40395340--T1105-RCE-Netcat.txt (0.3 KB)
- 001 (T1552) Privesc PEASS-ng.mp4 (219.9 MB)
- 001 (T1552) Privesc PEASS-ng_en.vtt (22.2 KB)
- 002 (T1057) Discovery Native Windows Commands.mp4 (74.1 MB)
- 002 (T1057) Discovery Native Windows Commands_en.vtt (7.7 KB)
- 003 Background Concept Certificate Signing Requests.mp4 (115.7 MB)
- 003 Background Concept Certificate Signing Requests_en.vtt (13.7 KB)
- 40397830--T1552-Privesc.txt (0.4 KB)
- 40398514--T1057-Discovery.txt (0.3 KB)
- 40399078-CSRs.txt (0.1 KB)
- 001 (T1572) Tunneling Reverse Proxy.mp4 (175.5 MB)
- 001 (T1572) Tunneling Reverse Proxy_en.vtt (15.1 KB)
- 002 (TA0006) Credential Access.mp4 (98.7 MB)
- 002 (TA0006) Credential Access_en.vtt (9.6 KB)
- 003 (T1110.002) Password Cracking.mp4 (53.4 MB)
- 003 (T1110.002) Password Cracking_en.vtt (4.7 KB)
- 004 (T1135) Lateral Movement.mp4 (119.5 MB)
- 004 (T1135) Lateral Movement_en.vtt (12.1 KB)
- 40436458-Credential-Access.txt (0.5 KB)
- 40436470--T1110.002-Password-Cracking.txt (0.4 KB)
- 40447594--T1135-Lateral-Movement.txt (0.2 KB)
- 40528528--T1572-Tunneling-Reverse-Proxy.txt (0.9 KB)
- 001 (T1583.004) Commando VM Setup.mp4 (198.9 MB)
- 001 (T1583.004) Commando VM Setup_en.vtt (21.0 KB)
- 002 (T1039) Commando VM Exploit Testing.mp4 (100.7 MB)
- 002 (T1039) Commando VM Exploit Testing_en.vtt (15.1 KB)
- 003 (T1587.001) Commando VM Exploit Testing 2.mp4 (77.9 MB)
- 003 (T1587.001) Commando VM Exploit Testing 2_en.vtt (10.2 KB)
- external-assets-links.txt (0.1 KB)
- 001 (T1204.002) Meterpreter + AV Bypass.mp4 (290.8 MB)
- 001 (T1204.002) Meterpreter + AV Bypass_en.vtt (30.8 KB)
- 002 Container Escape + Exploration.mp4 (107.8 MB)
- 002 Container Escape + Exploration_en.vtt (12.5 KB)
- 40528856--T1204-002-Meterpreter-AV-Bypass.txt (1.2 KB)
- 40528926-Container-Escape-and-Exploration.txt (0.2 KB)
- 001 (T1105) Ingress Tool Transfer.mp4 (137.6 MB)
- 001 (T1105) Ingress Tool Transfer_en.vtt (13.7 KB)
- 002 Compromise ADCS.mp4 (184.0 MB)
- 002 Compromise ADCS_en.vtt (17.6 KB)
- 003 Compromise NoPAC CVE.mp4 (166.0 MB)
- 003 Compromise NoPAC CVE_en.vtt (16.0 KB)
- 40528968--T1105-Ingress-Tool-Transfer.txt (0.8 KB)
- 40529054-Compromise-ADCS.txt (0.9 KB)
- 40529176-Compromise-NoPAC-CVE.txt (0.5 KB)
- external-assets-links.txt (0.2 KB)
- 001 (T1021.001) Enable RDP + Impair Defenses.mp4 (46.5 MB)
- 001 (T1021.001) Enable RDP + Impair Defenses_en.vtt (4.7 KB)
- 002 IIS Log + ASP Web App Source Code Review.mp4 (162.5 MB)
- 002 IIS Log + ASP Web App Source Code Review_en.vtt (16.3 KB)
- 40529238--T1021-001-Enable-RDP-Impair-Defenses.txt (0.3 KB)
- 40529346-IIS-Log-And-Source-Code-Review.txt (0.2 KB)
- Bonus Resources.txt (0.4 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce