11. Gaining Access - Client Side Attacks/4. Generating An Undetectable Backdoor Using Veil 3.mp420.76MB
11. Gaining Access - Client Side Attacks/5. Listening For Incoming Connections.mp412.48MB
11. Gaining Access - Client Side Attacks/6. Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp415.96MB
11. Gaining Access - Client Side Attacks/7. Backdoor Delivery Method 1 - Using a Fake Update.mp495.8MB
11. Gaining Access - Client Side Attacks/8. Backdoor Delivery Method 2 - Backdooring Downloads on The Fly.mp472.23MB
11. Gaining Access - Client Side Attacks/9. How to Protect Yourself From The Discussed Delivery Methods.mp460.8MB
12. Gaining Access - Client Side Attacks - Social Engineering/1. Introduction.mp449.09MB
12. Gaining Access - Client Side Attacks - Social Engineering/2. Maltego Basics.mp471.06MB
12. Gaining Access - Client Side Attacks - Social Engineering/3. Discovering Websites, Links & Social Networking Accounts Associated With Target.mp422.62MB
12. Gaining Access - Client Side Attacks - Social Engineering/4. Discovering Twitter Friends & Associated Accounts.mp415.3MB
12. Gaining Access - Client Side Attacks - Social Engineering/5. Discovering Emails Of The Target's Friends.mp413.14MB
12. Gaining Access - Client Side Attacks - Social Engineering/6. Analysing The Gathered Info & Building An Attack Strategy.mp426.5MB
12. Gaining Access - Client Side Attacks - Social Engineering/7. Backdooring Any File Type (images, pdf's ...etc).mp412.77MB
12. Gaining Access - Client Side Attacks - Social Engineering/8. Compiling & Changing Trojan's Icon.mp416.42MB
12. Gaining Access - Client Side Attacks - Social Engineering/9. Spoofing .exe Extension To Any Extension (jpg, pdf ...etc).mp419.31MB
12. Gaining Access - Client Side Attacks - Social Engineering/10. Spoofing Emails - Setting Up am SMTP Server.mp485.85MB
12. Gaining Access - Client Side Attacks - Social Engineering/11. Email Spoofing - Sending Emails as Any Email Account.mp4139.36MB
12. Gaining Access - Client Side Attacks - Social Engineering/12. BeEF Overview & Basic Hook Method.mp492.91MB
12. Gaining Access - Client Side Attacks - Social Engineering/13. BeEF - hooking targets using MITMf.mp447.78MB
12. Gaining Access - Client Side Attacks - Social Engineering/14. BeEF - Running Basic Commands On Target.mp446.19MB
12. Gaining Access - Client Side Attacks - Social Engineering/15. BeEF - Stealing CredentialsPasswords Using A Fake Login Prompt.mp427.22MB
12. Gaining Access - Client Side Attacks - Social Engineering/16. BeEF - Gaining Full Control Over Windows Target.mp436.65MB
12. Gaining Access - Client Side Attacks - Social Engineering/17. Detecting Trojans Manually.mp480.84MB
12. Gaining Access - Client Side Attacks - Social Engineering/18. Detecting Trojans Using a Sandbox.mp444.09MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/1. Overview of the Setup.mp4104.02MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/2. Ex1 - Generating a Backdoor That Works Outside The Network.mp481.15MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/3. Configuring The Router To Forward Connections To Kali.mp490.24MB
13. Gaining Access - Using The Above Attacks Outside The Local Network/4. Ex2 - Using BeEF Outside The Network.mp478.82MB
14. Post Exploitation/1. Introduction.mp438.11MB
14. Post Exploitation/2. Meterpreter Basics.mp458.13MB
14. Post Exploitation/3. File System Commands.mp442.16MB
14. Post Exploitation/4. Maintaining Access - Basic Methods.mp450.23MB
14. Post Exploitation/5. Maintaining Access - Using a Reliable & Undetectable Method.mp471.19MB