Filename Size ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 41.4 MB ~Get Your Files Here !/1. Introduction/1. Introduction.mp4.jpg 193.5 KB ~Get Your Files Here !/1. Introduction/1. Introduction.srt 6.3 KB ~Get Your Files Here !/2. Introduction to SQL/1. Introduction to SQL and databases.mp4 41.1 MB ~Get Your Files Here !/2. Introduction to SQL/1. Introduction to SQL and databases.srt 9.1 KB ~Get Your Files Here !/2. Introduction to SQL/2. Methods of databases hacking.mp4 36 MB ~Get Your Files Here !/2. Introduction to SQL/2. Methods of databases hacking.srt 7.8 KB ~Get Your Files Here !/3. building your lab/1. Download and Install Vmware.mp4 29.7 MB ~Get Your Files Here !/3. building your lab/1. Download and Install Vmware.srt 4.4 KB ~Get Your Files Here !/3. building your lab/2. Download and Install Virtualbox.mp4 91.2 MB ~Get Your Files Here !/3. building your lab/2. Download and Install Virtualbox.srt 9.5 KB ~Get Your Files Here !/3. building your lab/3. Download and Install Kali Linux.mp4 74.2 MB ~Get Your Files Here !/3. building your lab/3. Download and Install Kali Linux.srt 8.2 KB ~Get Your Files Here !/3. building your lab/4. take a look on kali Linux.mp4 49.3 MB ~Get Your Files Here !/3. building your lab/4. take a look on kali Linux.srt 6 KB ~Get Your Files Here !/3. building your lab/5. Download and Install Metasploitable2(vulnerable web application).mp4 70.6 MB ~Get Your Files Here !/3. building your lab/5. Download and Install Metasploitable2(vulnerable web application).srt 9 KB ~Get Your Files Here !/3. building your lab/6. Download and Install Windows 10 VM..mp4 34.4 MB ~Get Your Files Here !/3. building your lab/6. Download and Install Windows 10 VM..srt 5.7 KB ~Get Your Files Here !/3. building your lab/7. Finishing lab Settings part 1.mp4 15.2 MB ~Get Your Files Here !/3. building your lab/7. Finishing lab Settings part 1.srt 3.3 KB ~Get Your Files Here !/3. building your lab/8. Finishing lab Settings part 2.mp4 10.6 MB ~Get Your Files Here !/3. building your lab/8. Finishing lab Settings part 2.srt 1.7 KB ~Get Your Files Here !/4. Essentials System Commands/1. Essential System Commands Part 1.mp4 63.6 MB ~Get Your Files Here !/4. Essentials System Commands/1. Essential System Commands Part 1.srt 9.9 KB ~Get Your Files Here !/4. Essentials System Commands/2. Essential System Commands Part 2.mp4 75.9 MB ~Get Your Files Here !/4. Essentials System Commands/2. Essential System Commands Part 2.srt 9.8 KB ~Get Your Files Here !/4. Essentials System Commands/3. Essential System Commands Part 3.mp4 60.8 MB ~Get Your Files Here !/4. Essentials System Commands/3. Essential System Commands Part 3.srt 5.6 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/1. Test URL Using SQLMAP.mp4 112.2 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/1. Test URL Using SQLMAP.srt 13.2 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/10. Interactive OS shell with databases.mp4 28.8 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/10. Interactive OS shell with databases.srt 3.9 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/11. Interactive OS shell with Vulnerable web application.mp4 12.5 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/11. Interactive OS shell with Vulnerable web application.srt 2 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/12. PHP backdoor Access.mp4 68.3 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/12. PHP backdoor Access.srt 14 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/13. SQL Injection (Always True Scenario).mp4 20.5 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/13. SQL Injection (Always True Scenario).srt 5.5 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/14. SQL Injection get database version.mp4 33.8 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/14. SQL Injection get database version.srt 7.3 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/15. SQL Injection get database user.mp4 26.2 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/15. SQL Injection get database user.srt 5.6 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/16. SQL Injection get Database name.mp4 22.4 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/16. SQL Injection get Database name.srt 5.1 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/17. SQL Injection Get tables from Information_schema.mp4 29.1 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/17. SQL Injection Get tables from Information_schema.srt 6.3 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/18. SQL Injection get information about specific table in database.mp4 47.6 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/18. SQL Injection get information about specific table in database.srt 6 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/19. SQL Injection get access to columns in databases.mp4 61.7 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/19. SQL Injection get access to columns in databases.srt 7.8 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/2. Using SQLMAP with Vulnerable Web Application.mp4 60.2 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/2. Using SQLMAP with Vulnerable Web Application.srt 10.5 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/3. Access to available databases names.mp4 99 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/3. Access to available databases names.srt 11.2 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/4. Access to available tables in databases.mp4 37 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/4. Access to available tables in databases.srt 8.6 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/5. Access to available columns in databases.mp4 36.7 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/5. Access to available columns in databases.srt 6.9 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/6. Access tables and columns in Vulnerable Web Application.mp4 24.6 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/6. Access tables and columns in Vulnerable Web Application.srt 5.2 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/7. Access Passwords and Passwords Hashes in databases.mp4 57.4 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/7. Access Passwords and Passwords Hashes in databases.srt 10.8 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/8. Access to Databases Information-Schema.mp4 38.3 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/8. Access to Databases Information-Schema.srt 7.6 KB ~Get Your Files Here !/5. Databases Hacking and Assessment/9. Dumb data from databases Columns.mp4 82.9 MB ~Get Your Files Here !/5. Databases Hacking and Assessment/9. Dumb data from databases Columns.srt 11 KB ~Get Your Files Here !/6. Practical Hacking/1. Practice Reverse Shell Attack.mp4 112.2 MB ~Get Your Files Here !/6. Practical Hacking/1. Practice Reverse Shell Attack.srt 14.6 KB ~Get Your Files Here !/6. Practical Hacking/2. Password Cracking.mp4 50.4 MB ~Get Your Files Here !/6. Practical Hacking/2. Password Cracking.srt 7.7 KB ~Get Your Files Here !/6. Practical Hacking/3. Packet Sniffing.mp4 44.8 MB ~Get Your Files Here !/6. Practical Hacking/3. Packet Sniffing.srt 6.7 KB ~Get Your Files Here !/Bonus Resources.txt 386 B