Previous Lecture Complete and continue  

  Advanced Wordlist Attacks - Introduction

Download
Gaining-Access-Advanced-Wordlist-Attacks.pdf