It is what it is.
  • U: Anonymous
  • D: 2019-06-30 07:36:11
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 ViGOROUS File size CRC
Download
7,514
Stored files
124 F6A64F95
108 04C35310
RAR-files
ppepade-7024-vigorous.rar 50,000,000 C052A78D
ppepade-7024-vigorous.r00 50,000,000 B17F4344
ppepade-7024-vigorous.r01 41,122,129 C7419555

Total size: 141,122,129
Archived files
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\04.Pillaging - The Manual Approach.en.srt 10,940 BE6FB1AF
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\05.Using Obtained Data for Further Privilege Escalation.en.srt 11,896 CF97B615
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\07.Automating Tasks During Pillaging and Module Summary.mp4 [e862984e780eed97] 12,154,316 3EFC91FC
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\05.Using Obtained Data for Further Privilege Escalation.mp4 [190b072a7d9c868f] 15,943,060 854489C9
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\07.Automating Tasks During Pillaging and Module Summary.en.srt 7,055 912F9B6D
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\06.Putting the Attack Together.en.srt 5,812 A821EC33
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\03.What Do You Look for During Post Exploitation.mp4 [5331fb119e3a438e] 14,534,230 CD6621E3
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\06.Putting the Attack Together.mp4 [41bdcf225308b24d] 7,696,263 D07F221A
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\04.Pillaging - The Manual Approach.mp4 [312d0f95408174e8] 17,777,384 51A4B14F
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System\03.What Do You Look for During Post Exploitation.en.srt 13,892 DCE7CD13
Post Exploitation - Pillaging and Data Exfiltration\1.Course Overview\01.Course Overview.mp4 [72e6977fada3d215] 3,663,583 8D902045
Post Exploitation - Pillaging and Data Exfiltration\1.Course Overview\01.Course Overview.en.srt 2,396 FADFB66D
Post Exploitation - Pillaging and Data Exfiltration\Exercise Files\post-exploitation-pillaging-data-exfiltration.zip 4,631,864 6EA35049
Post Exploitation - Pillaging and Data Exfiltration\2.How Do You Demonstrate Impact to Your Client\02.So What Is Pillaging.mp4 [a139fbdc10823983] 7,375,431 0E91CCB4
Post Exploitation - Pillaging and Data Exfiltration\2.How Do You Demonstrate Impact to Your Client\02.So What Is Pillaging.en.srt 7,206 F22D1D2E
Post Exploitation - Pillaging and Data Exfiltration\5.Course Summary and Next Steps\13.Course Summary.en.srt 5,388 FE57A2EB
Post Exploitation - Pillaging and Data Exfiltration\5.Course Summary and Next Steps\13.Course Summary.mp4 [29d1a07d8f37fbc3] 5,718,651 5709832D
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\08.What's the Next Step in the Process.mp4 [2069c3db47ed46f7] 6,666,169 DC48CAD0
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\11.Exfiltration through the Internet and Physical Vectors.mp4 [c72b9656e7154bf5] 10,624,967 A074D8F7
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\11.Exfiltration through the Internet and Physical Vectors.en.srt 9,942 C2DA80E4
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\12.The Three Step Process to Data Exfiltration.en.srt 6,013 9826128D
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\09.Avenues for Data Exfiltration and Data Loss Prevention Systems.mp4 [a15699a1bbca322] 11,079,917 B1429832
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\10.Bypassing Data Loss Prevention Systems.en.srt 14,468 76184D8D
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\12.The Three Step Process to Data Exfiltration.mp4 [86bc017f4dac6fa0] 5,732,123 693530C9
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\08.What's the Next Step in the Process.en.srt 6,939 3DC61DEF
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\09.Avenues for Data Exfiltration and Data Loss Prevention Systems.en.srt 11,146 9EE143FE
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data\10.Bypassing Data Loss Prevention Systems.mp4 [ddf4fa3de57321a3] 17,404,905 C962EC9F
Post Exploitation - Pillaging and Data Exfiltration\3.Pillaging - Acquiring Information About the User and System 0 00000000
Post Exploitation - Pillaging and Data Exfiltration\1.Course Overview 0 00000000
Post Exploitation - Pillaging and Data Exfiltration\Exercise Files 0 00000000
Post Exploitation - Pillaging and Data Exfiltration\2.How Do You Demonstrate Impact to Your Client 0 00000000
Post Exploitation - Pillaging and Data Exfiltration\5.Course Summary and Next Steps 0 00000000
Post Exploitation - Pillaging and Data Exfiltration\4.Testing Perimeter Defenses - Exfiltrating Data 0 00000000
Post Exploitation - Pillaging and Data Exfiltration 0 00000000

Total size: 141,115,956
RAR Recovery
Not Present
Labels UNKNOWN