RAR-files |
linkedin.learning.penetration.testing.active.directory-xqzt.rar |
50,000,000 |
935D47DE |
linkedin.learning.penetration.testing.active.directory-xqzt.r00 |
50,000,000 |
51A9397C |
linkedin.learning.penetration.testing.active.directory-xqzt.r01 |
50,000,000 |
B1B69A84 |
linkedin.learning.penetration.testing.active.directory-xqzt.r02 |
50,000,000 |
36834271 |
linkedin.learning.penetration.testing.active.directory-xqzt.r03 |
4,379,224 |
A7C92E35 |
|
Total size: |
204,379,224 |
|
|
Archived
files |
01.01-understand_and_test_the_security_of_identity_providers.mkv
[312e13add6d4ae71]
|
3,537,690 |
B7787DB7 |
01.02-what_you_should_know.mkv
[9cccfca7e64439bb]
|
1,268,927 |
ABE6A19B |
01.03-disclaimer.mkv
[b4af6076f14947be]
|
2,802,910 |
5EE22FBE |
02.01-understand_active_directorys_role_in_security.mkv
[8d1a932b8b4a88f1]
|
12,448,000 |
FD49AB15 |
02.02-the_ldap_protocol.mkv
[cc9c642cf1ab8346]
|
4,002,235 |
E08E6BC4 |
02.03-interact_with_ldap_at_the_command_line.mkv
[a9e8fec5929180a3]
|
8,108,980 |
B32AD2AD |
02.04-the_ldapadmin_tool.mkv
[bc50ca7c3413473b]
|
3,337,505 |
19D48326 |
02.05-what_is_active_directory.mkv
[2a8b728aee38e4ec]
|
13,851,065 |
58BFDB1C |
02.06-interact_with_active_directory_at_the_command_line.mkv
[b46296685fabbca0]
|
3,625,225 |
E30D5062 |
02.07-access_ldap_services_with_a_gui_client.mkv
[97ceba9d1807b24f]
|
18,253,398 |
D147D7AB |
02.08-add_users_and_computers_to_a_domain.mkv
[395015185b474f5e]
|
11,733,559 |
38A96881 |
02.09-active_directory_security_audit.mkv
[154154f83504932a]
|
3,678,846 |
19102FE3 |
03.01-set_up_for_testing.mkv
[73eb5d1fdeae9fe]
|
14,246,845 |
D4A1D2FD |
03.02-extract_the_ad_hashes.mkv
[f5876cd16d6d6422]
|
8,121,375 |
763AB610 |
03.03-password_spraying_active_directory.mkv
[e3a436968a8158a8]
|
7,258,579 |
7AA0F626 |
03.04-kerberos_brute-forcing_attacks.mkv
[6e07a82692cfb084]
|
6,171,609 |
6BE060FD |
03.05-use_crackmapexec_to_access_and_enumerate_ad.mkv
[15b75b28a162312c]
|
7,449,113 |
4E7B7089 |
03.06-investigate_the_sysvol_share.mkv
[cd3e95d1d4723555]
|
6,511,956 |
A9675D22 |
03.07-take_advantage_of_legacy_data.mkv
[ad626dfa22dc2ad]
|
5,250,428 |
7CF359C9 |
04.01-specific_active_directory_attacks.mkv
[38d6e63fe37fea42]
|
2,360,103 |
05BDACCC |
04.02-remote_extraction_of_ad_hashes.mkv
[41ad12eb132d3881]
|
5,372,386 |
6B35EEB2 |
04.03-carry_out_a_kerberos_roasting.mkv
[259dab86f12f345f]
|
4,541,818 |
7DE96E13 |
04.04-run_a_no-preauthentication_attack.mkv
[4a640eab2ad2ad30]
|
13,303,497 |
7A8A411A |
04.05-forge_a_golden_ticket.mkv
[936e3b695e518f89]
|
17,184,169 |
1C714D4A |
04.06-set_the_bloodhound_loose.mkv
[915e306cfa797474]
|
17,681,685 |
EC2BC890 |
05.01-next_steps.mkv
[5277b9cd2b6743df]
|
2,274,827 |
0CC3E55D |
|
Total size: |
204,376,730 |
|
|