zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[GigaCourse.Com] Udemy - Practical Ethical Hacking – The Complete Course
magnet:?xt=urn:btih:602d2d44fb5a46872d60e0acfaed79f45bc3cc6b&dn=[GigaCourse.Com] Udemy - Practical Ethical Hacking – The Complete Course
磁力链接详情
文件列表详情
602d2d44fb5a46872d60e0acfaed79f45bc3cc6b
infohash:
190
文件数量
11.95 GB
文件大小
2023-5-1 02:26
创建日期
2024-11-20 00:53
最后访问
相关分词
GigaCourse
Com
Udemy
-
Practical
Ethical
Hacking
–
The
Complete
Course
1. Introduction/1. Introduction and Course Overview.mp4 10.25 MB
1. Introduction/2. A Day in the Life of an Ethical Hacker.mp4 40.94 MB
10. Additional Scanning Tools/1. Scanning with Masscan.mp4 26.46 MB
10. Additional Scanning Tools/2. Scanning with Metasploit.mp4 22.67 MB
10. Additional Scanning Tools/3. Scanning with Nessus - Part 1.mp4 98.95 MB
10. Additional Scanning Tools/4. Scanning with Nessus - Part 2.mp4 50.58 MB
11. Exploitation Basics/1. Reverse Shells vs Bind Shells.mp4 37.03 MB
11. Exploitation Basics/2. Staged vs Non-Staged Payloads.mp4 12.64 MB
11. Exploitation Basics/3. Gaining Root with Metasploit.mp4 54.14 MB
11. Exploitation Basics/4. Manual Exploitation.mp4 136.32 MB
11. Exploitation Basics/5. Brute Force Attacks.mp4 93.15 MB
11. Exploitation Basics/6. Password Spraying and Credential Stuffing.mp4 156.73 MB
11. Exploitation Basics/7. Our Notes, Revisited.mp4 17.31 MB
12. Mid-Course Capstone/1. Introduction.mp4 75.9 MB
12. Mid-Course Capstone/10. Walkthrough - Grandpa.mp4 163.27 MB
12. Mid-Course Capstone/11. Walkthrough - Netmon.mp4 233.95 MB
12. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 331.86 MB
12. Mid-Course Capstone/3. Walkthrough - Lame.mp4 279.97 MB
12. Mid-Course Capstone/4. Walkthrough - Blue.mp4 284.2 MB
12. Mid-Course Capstone/5. Walkthrough - Devel.mp4 246.72 MB
12. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 305.36 MB
12. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 285.37 MB
12. Mid-Course Capstone/8. Walkthrough - Optimum.mp4 235.56 MB
12. Mid-Course Capstone/9. Walkthrough - Bashed.mp4 242.27 MB
13. Introduction to Exploit Development (Buffer Overflows)/1. Required Installations.mp4 58.44 MB
13. Introduction to Exploit Development (Buffer Overflows)/2. Buffer Overflows Explained.mp4 30.15 MB
13. Introduction to Exploit Development (Buffer Overflows)/3. Spiking.mp4 60.29 MB
13. Introduction to Exploit Development (Buffer Overflows)/4. Fuzzing.mp4 29.52 MB
13. Introduction to Exploit Development (Buffer Overflows)/5. Finding the Offset.mp4 42.16 MB
13. Introduction to Exploit Development (Buffer Overflows)/6. Overwriting the EIP.mp4 16.71 MB
13. Introduction to Exploit Development (Buffer Overflows)/7. Finding Bad Characters.mp4 44.79 MB
13. Introduction to Exploit Development (Buffer Overflows)/8. Finding the Right Module.mp4 65.88 MB
13. Introduction to Exploit Development (Buffer Overflows)/9. Generating Shellcode and Getting Root.mp4 35.11 MB
14. Active Directory Overview/1. Active Directory Overview.mp4 22.55 MB
14. Active Directory Overview/2. Physical Active Directory Components.mp4 20.03 MB
14. Active Directory Overview/3. Logical Active Directory Components.mp4 22.86 MB
15. Active Directory Lab Build/1. Lab Overview and Requirements.mp4 7.64 MB
15. Active Directory Lab Build/2. Downloading Necessary ISOs.mp4 17.83 MB
15. Active Directory Lab Build/3. Setting Up the Domain Controller.mp4 76.24 MB
15. Active Directory Lab Build/4. Setting Up the User Machines.mp4 35.7 MB
15. Active Directory Lab Build/5. Setting Up Users, Groups, and Policies.mp4 99.71 MB
15. Active Directory Lab Build/6. Joining Our Machines to the Domain.mp4 79.33 MB
16. Attacking Active Directory Initial Attack Vectors/1. Introduction.mp4 25.65 MB
16. Attacking Active Directory Initial Attack Vectors/10. SMB Relay Attack Demonstration Part 2.mp4 29.56 MB
16. Attacking Active Directory Initial Attack Vectors/11. SMB Relay Attack Defenses.mp4 12.68 MB
16. Attacking Active Directory Initial Attack Vectors/12. Gaining Shell Access.mp4 61.25 MB
16. Attacking Active Directory Initial Attack Vectors/13. IPv6 Attacks Overview.mp4 9.18 MB
16. Attacking Active Directory Initial Attack Vectors/14. Installing mitm6.mp4 13.49 MB
16. Attacking Active Directory Initial Attack Vectors/15. Setting Up LDAPS.mp4 12.91 MB
16. Attacking Active Directory Initial Attack Vectors/16. IPv6 DNS Takeover via mitm6.mp4 86.77 MB
16. Attacking Active Directory Initial Attack Vectors/17. IPv6 Attack Defenses.mp4 19.9 MB
16. Attacking Active Directory Initial Attack Vectors/18. Other Attack Vectors and Strategies.mp4 26.96 MB
16. Attacking Active Directory Initial Attack Vectors/2. LLMNR Poisoning Overview.mp4 45.67 MB
16. Attacking Active Directory Initial Attack Vectors/3. Capturing NTLMv2 Hashes with Responder.mp4 52.79 MB
16. Attacking Active Directory Initial Attack Vectors/4. Password Cracking with Hashcat.mp4 154.34 MB
16. Attacking Active Directory Initial Attack Vectors/5. LLMNR Poisoning Defenses.mp4 18.29 MB
16. Attacking Active Directory Initial Attack Vectors/6. SMB Relay Attacks Overview.mp4 26.85 MB
16. Attacking Active Directory Initial Attack Vectors/7. Quick Lab Update.mp4 9.25 MB
16. Attacking Active Directory Initial Attack Vectors/8. Discovering Hosts with SMB Signing Disabled.mp4 42.18 MB
16. Attacking Active Directory Initial Attack Vectors/9. SMB Relay Attack Demonstration Part 1.mp4 52.09 MB
17. Attacking Active Directory Post-Compromise Enumeration/1. Introduction.mp4 3.51 MB
17. Attacking Active Directory Post-Compromise Enumeration/2. PowerView Overview.mp4 20.05 MB
17. Attacking Active Directory Post-Compromise Enumeration/3. Domain Enumeration with PowerView.mp4 139.47 MB
17. Attacking Active Directory Post-Compromise Enumeration/4. Bloodhound Overview and Setup.mp4 35.91 MB
17. Attacking Active Directory Post-Compromise Enumeration/5. Grabbing Data with Invoke-Bloodhound.mp4 31.57 MB
17. Attacking Active Directory Post-Compromise Enumeration/6. Enumerating Domain Data with Bloodhound.mp4 34.56 MB
18. Attacking Active Directory Post-Compromise Attacks/1. Introduction.mp4 1.95 MB
18. Attacking Active Directory Post-Compromise Attacks/10. Token Impersonation with Incognito.mp4 48.12 MB
18. Attacking Active Directory Post-Compromise Attacks/11. Token Impersonation Mitigation.mp4 15.2 MB
18. Attacking Active Directory Post-Compromise Attacks/12. Kerberoasting Overview.mp4 25.77 MB
18. Attacking Active Directory Post-Compromise Attacks/13. Kerberoasting Walkthrough.mp4 43.33 MB
18. Attacking Active Directory Post-Compromise Attacks/14. Kerberoasting Mitigation.mp4 7.42 MB
18. Attacking Active Directory Post-Compromise Attacks/15. GPP cPassword Attacks Overview.mp4 21.85 MB
18. Attacking Active Directory Post-Compromise Attacks/16. Abusing GPP Part 1.mp4 63.18 MB
18. Attacking Active Directory Post-Compromise Attacks/17. Abusing GPP Part 2.mp4 41.61 MB
18. Attacking Active Directory Post-Compromise Attacks/18. Mimikatz Overview.mp4 33.11 MB
18. Attacking Active Directory Post-Compromise Attacks/19. Credential Dumping with Mimikatz.mp4 72.34 MB
18. Attacking Active Directory Post-Compromise Attacks/2. Pass the Hash Password Overview.mp4 17.88 MB
18. Attacking Active Directory Post-Compromise Attacks/20. Golden Ticket Attacks.mp4 52.34 MB
18. Attacking Active Directory Post-Compromise Attacks/21. Conclusion and Additional Resources.mp4 69.97 MB
18. Attacking Active Directory Post-Compromise Attacks/3. Installing crackmapexec.mp4 8.21 MB
18. Attacking Active Directory Post-Compromise Attacks/4. Pass the Password Attacks.mp4 67.27 MB
18. Attacking Active Directory Post-Compromise Attacks/5. Dumping Hashes with secretsdump.py.mp4 24.03 MB
18. Attacking Active Directory Post-Compromise Attacks/6. Cracking NTLM Hashes with Hashcat.mp4 27.38 MB
18. Attacking Active Directory Post-Compromise Attacks/7. Pass the Hash Attacks.mp4 53.6 MB
18. Attacking Active Directory Post-Compromise Attacks/8. Pass Attack Mitigations.mp4 14.42 MB
18. Attacking Active Directory Post-Compromise Attacks/9. Token Impersonation Overview.mp4 16.21 MB
19. Post Exploitation/1. Introduction.mp4 2.76 MB
19. Post Exploitation/2. File Transfers Review.mp4 8.04 MB
19. Post Exploitation/3. Maintaining Access Overview.mp4 7.8 MB
19. Post Exploitation/4. Pivoting Lab Setup.mp4 59.08 MB
19. Post Exploitation/5. Pivoting Walkthrough.mp4 52.11 MB
19. Post Exploitation/6. Cleaning Up.mp4 5.59 MB
2. Note Keeping/1. Part 1 Effective Note Keeping.mp4 44.41 MB
2. Note Keeping/2. Part 2 Important Tools.mp4 38.73 MB
20. Web Application Enumeration, Revisited/1. Introduction.mp4 3.56 MB
20. Web Application Enumeration, Revisited/2. Installing Go.mp4 48.93 MB
20. Web Application Enumeration, Revisited/3. Finding Subdomains with Assetfinder.mp4 36.38 MB
20. Web Application Enumeration, Revisited/4. Finding Subdomains with Amass.mp4 56.97 MB
20. Web Application Enumeration, Revisited/5. Finding Alive Domains with Httprobe.mp4 75.66 MB
20. Web Application Enumeration, Revisited/6. Screenshotting Websites with GoWitness.mp4 33.69 MB
20. Web Application Enumeration, Revisited/7. Automating the Enumeration Process.mp4 53.74 MB
21. Testing the Top 10 Web Application Vulnerabilities/1. Introduction.mp4 3.93 MB
21. Testing the Top 10 Web Application Vulnerabilities/10. Broken Authentication Overview and Defenses.mp4 78.63 MB
21. Testing the Top 10 Web Application Vulnerabilities/11. Testing for Broken Authentication.mp4 63.52 MB
21. Testing the Top 10 Web Application Vulnerabilities/12. Sensitive Data Exposure Overview and Defenses.mp4 66.65 MB
21. Testing the Top 10 Web Application Vulnerabilities/13. Testing for Sensitive Data Exposure.mp4 79.91 MB
21. Testing the Top 10 Web Application Vulnerabilities/14. XML External Entities (XXE) Overview.mp4 28.18 MB
21. Testing the Top 10 Web Application Vulnerabilities/15. XXE Attack and Defense.mp4 77.43 MB
21. Testing the Top 10 Web Application Vulnerabilities/16. Broken Access Control Overview.mp4 48.52 MB
21. Testing the Top 10 Web Application Vulnerabilities/17. Broken Access Control Walkthrough.mp4 35.49 MB
21. Testing the Top 10 Web Application Vulnerabilities/18. Security Misconfiguration Attacks and Defenses.mp4 68.17 MB
21. Testing the Top 10 Web Application Vulnerabilities/19. Cross-Site Scripting (XSS) Overview.mp4 81.87 MB
21. Testing the Top 10 Web Application Vulnerabilities/2. The OWASP Top 10 and OWASP Testing Checklist.mp4 130.36 MB
21. Testing the Top 10 Web Application Vulnerabilities/20. Reflected XSS Walkthrough.mp4 73.6 MB
21. Testing the Top 10 Web Application Vulnerabilities/21. Stored XSS Walkthrough.mp4 49.05 MB
21. Testing the Top 10 Web Application Vulnerabilities/22. Preventing XSS.mp4 11.86 MB
21. Testing the Top 10 Web Application Vulnerabilities/23. Insecure Deserialization.mp4 57.28 MB
21. Testing the Top 10 Web Application Vulnerabilities/24. Using Components with Known Vulnerabilities.mp4 52.93 MB
21. Testing the Top 10 Web Application Vulnerabilities/25. Insufficient Logging and Monitoring.mp4 40.51 MB
21. Testing the Top 10 Web Application Vulnerabilities/3. Installing OWASP Juice Shop.mp4 88.63 MB
21. Testing the Top 10 Web Application Vulnerabilities/4. Installing Foxy Proxy.mp4 27.13 MB
21. Testing the Top 10 Web Application Vulnerabilities/5. Exploring Burp Suite.mp4 106.02 MB
21. Testing the Top 10 Web Application Vulnerabilities/6. Introducing the Score Board.mp4 30.66 MB
21. Testing the Top 10 Web Application Vulnerabilities/7. SQL Injection Attacks Overview.mp4 19.23 MB
21. Testing the Top 10 Web Application Vulnerabilities/8. SQL Injection Walkthrough.mp4 85.2 MB
21. Testing the Top 10 Web Application Vulnerabilities/9. SQL Injection Defenses.mp4 9.28 MB
22. Wireless Penetration Testing/1. Wireless Penetration Testing Overview.mp4 48.36 MB
22. Wireless Penetration Testing/2. WPA PSK Exploit Walkthrough.mp4 126.92 MB
23. Legal Documents and Report Writing/1. Common Legal Documents.mp4 25.43 MB
23. Legal Documents and Report Writing/2. Pentest Report Writing.mp4 62.59 MB
23. Legal Documents and Report Writing/3. Reviewing a Real Pentest Report.mp4 79.25 MB
24. Career Advice/1. Career Advice.mp4 36.5 MB
25. BONUS Section/1. BONUS LECTURE Course Discord Channel and Other Author Resources.mp4 42.54 MB
3. Networking Refresher/1. Introduction.mp4 4.5 MB
3. Networking Refresher/2. IP Addresses.mp4 78.33 MB
3. Networking Refresher/3. MAC Addresses.mp4 28.67 MB
3. Networking Refresher/4. TCP, UDP, and the Three-Way Handshake.mp4 21.71 MB
3. Networking Refresher/5. Common Ports and Protocols.mp4 16.72 MB
3. Networking Refresher/6. The OSI Model.mp4 12.55 MB
3. Networking Refresher/7. Subnetting Part 1 - Methodology.mp4 126.49 MB
3. Networking Refresher/8. Subnetting Part 2 - Hands-On Challenge.mp4 33.29 MB
3. Networking Refresher/9. Building a Network with Packet Tracer.mp4 87.14 MB
4. Setting Up Our Lab/1. Installing VMWare Virtualbox.mp4 54.83 MB
4. Setting Up Our Lab/2. Installing Kali Linux.mp4 45.18 MB
5. Introduction to Linux/1. Exploring Kali Linux.mp4 70.26 MB
5. Introduction to Linux/2. Navigating the File System.mp4 113.39 MB
5. Introduction to Linux/3. Users and Privileges.mp4 94.17 MB
5. Introduction to Linux/4. Common Network Commands.mp4 63.73 MB
5. Introduction to Linux/5. Viewing, Creating, and Editing Files.mp4 39.87 MB
5. Introduction to Linux/6. Starting and Stopping Kali Services.mp4 82.15 MB
5. Introduction to Linux/7. Installing and Updating Tools.mp4 75.52 MB
5. Introduction to Linux/8. Scripting with Bash.mp4 133.32 MB
6. Introduction to Python/1. Introduction.mp4 7.72 MB
6. Introduction to Python/10. Tuples.mp4 31.8 MB
6. Introduction to Python/11. Looping.mp4 58.74 MB
6. Introduction to Python/12. Importing Modules.mp4 50.85 MB
6. Introduction to Python/13. Advanced Strings.mp4 145.42 MB
6. Introduction to Python/14. Dictionaries.mp4 114.61 MB
6. Introduction to Python/15. Sockets.mp4 47.38 MB
6. Introduction to Python/16. Building a Port Scanner.mp4 247.59 MB
6. Introduction to Python/2. Strings.mp4 55.01 MB
6. Introduction to Python/3. Math.mp4 43.27 MB
6. Introduction to Python/4. Variables & Methods.mp4 110.6 MB
6. Introduction to Python/5. Functions.mp4 97.18 MB
6. Introduction to Python/6. Boolean Expressions.mp4 37.39 MB
6. Introduction to Python/7. Releational and Boolean Operators.mp4 74.87 MB
6. Introduction to Python/8. Conditional Statements.mp4 122.46 MB
6. Introduction to Python/9. Lists.mp4 143.15 MB
7. The Ethical Hacker Methodology/1. The Five Stages of Ethical Hacking.mp4 13.61 MB
8. Information Gathering (Reconnaissance)/1. Passive Reconnaissance Overview.mp4 21.32 MB
8. Information Gathering (Reconnaissance)/10. Information Gathering with Burp Suite.mp4 105.71 MB
8. Information Gathering (Reconnaissance)/11. Google Fu.mp4 58.39 MB
8. Information Gathering (Reconnaissance)/12. Utilizing Social Media.mp4 40.18 MB
8. Information Gathering (Reconnaissance)/2. Identifying Our Target.mp4 42.91 MB
8. Information Gathering (Reconnaissance)/3. E-Mail Address Gathering with Hunter.io.mp4 20.35 MB
8. Information Gathering (Reconnaissance)/4. Gathering Breached Credentials with Breach-Parse.mp4 69.78 MB
8. Information Gathering (Reconnaissance)/5. Gathering Breached Credentials with WeLeakInfo.mp4 60.26 MB
8. Information Gathering (Reconnaissance)/6. Utilizing theharvester.mp4 50.96 MB
8. Information Gathering (Reconnaissance)/7. Hunting Subdomains - Part 1.mp4 79.5 MB
8. Information Gathering (Reconnaissance)/8. Hunting Subdomains - Part 2.mp4 65.93 MB
8. Information Gathering (Reconnaissance)/9. Identifying Website Technologies.mp4 96.39 MB
9. Scanning & Enumeration/1. Installing Kioptrix Level 1.mp4 44.84 MB
9. Scanning & Enumeration/2. Scanning with Nmap.mp4 102.37 MB
9. Scanning & Enumeration/3. Enumerating HTTPHTTPS - Part 1.mp4 111.19 MB
9. Scanning & Enumeration/4. Enumerating HTTPHTTPS - Part 2.mp4 150.58 MB
9. Scanning & Enumeration/5. Enumerating SMB.mp4 90.27 MB
9. Scanning & Enumeration/6. Enumerating SSH.mp4 31.11 MB
9. Scanning & Enumeration/7. Researching Potential Vulnerabilities.mp4 138.55 MB
9. Scanning & Enumeration/8. Our Notes, so Far.mp4 16.13 MB
其他位置