zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[DesireCourse.Net] Udemy - Penetration Testing with KALI and More All You Need to Know
magnet:?xt=urn:btih:a90b393ff43d455e4071c1a06172d6f559aa3d69&dn=[DesireCourse.Net] Udemy - Penetration Testing with KALI and More All You Need to Know
磁力链接详情
文件列表详情
a90b393ff43d455e4071c1a06172d6f559aa3d69
infohash:
85
文件数量
4.15 GB
文件大小
2023-1-26 05:43
创建日期
2024-11-7 18:25
最后访问
相关分词
DesireCourse
Net
Udemy
-
Penetration
Testing
with
KALI
and
More
All
You
Need
to
Know
1. Introduction/1. The Undeniable Power of Ethical Hacking.mp4 11.56 MB
10. Proven Social Engineering Techniques/1. Attack Vectors.mp4 14.72 MB
10. Proven Social Engineering Techniques/2. Open-source Intelligence (OSINT).mp4 6.75 MB
10. Proven Social Engineering Techniques/3. Google Dorks Live Examples.mp4 60.15 MB
10. Proven Social Engineering Techniques/4. Track and Spoof Emails Easily.mp4 37.64 MB
10. Proven Social Engineering Techniques/5. Collect and Visualize Data with Maltego.mp4 68.55 MB
10. Proven Social Engineering Techniques/6. Execute a Phishing Attack.mp4 71.99 MB
10. Proven Social Engineering Techniques/7. Hack Facebook, Twitter, and Gmail Accounts.mp4 88.51 MB
11. Attack Mobile Phones/1. Mobile Attack Surface.mp4 14.4 MB
11. Attack Mobile Phones/2. Decrypt SSL Session.mp4 91.2 MB
11. Attack Mobile Phones/3. Reverse Engineer an Android Application.mp4 78.79 MB
11. Attack Mobile Phones/4. Hack an Android Phone and Download its Contacts.mp4 74.37 MB
12. Maintain Access/1. Post-Exploitation Terminologies.mp4 13.2 MB
12. Maintain Access/2. Backdoor Tools Explained.mp4 14.98 MB
12. Maintain Access/3. Netcat Simplified.mp4 97.71 MB
12. Maintain Access/4. Install a Backdoor.mp4 95.07 MB
12. Maintain Access/5. Deface a Website in Few Seconds.mp4 54.6 MB
12. Maintain Access/6. Create a Simple Ransomware.mp4 33.46 MB
12. Maintain Access/7. Understand Hidden Tear Ransomware.mp4 109.87 MB
12. Maintain Access/8. Bypass Firewalls by Tunneling Data and Commands over DNS.mp4 69.54 MB
13. Let’s Get Real/1. Publish Your Weapons Online.mp4 31.26 MB
13. Let’s Get Real/2. Stay Anonymous Online.mp4 41.87 MB
13. Let’s Get Real/3. Setup a Stealthy Command and Control Center Online.mp4 51.16 MB
14. How to Prepare and Present Your Report/1. Report Writing Techniques.mp4 87.47 MB
14. How to Prepare and Present Your Report/2. How Can Pentest.ws Help You.mp4 71.03 MB
15. Secret Sauce BONUS/1. Create a WiFi Jammer.mp4 127.35 MB
15. Secret Sauce BONUS/2. Create a $3 Rubber Ducky Key-logger.mp4 113.12 MB
2. Setup Your Lab/1. Why KALI.mp4 7.57 MB
2. Setup Your Lab/2. Different Installation Methods.mp4 4.32 MB
2. Setup Your Lab/3. Install KALI.mp4 31.69 MB
2. Setup Your Lab/4. Color Coding for Root User.mp4 8.04 MB
2. Setup Your Lab/5. Install Windows (Victim's Machine).mp4 16.33 MB
3. Explore KALI/1. Master KALI Desktop Environment.mp4 33.52 MB
3. Explore KALI/2. Color Coding.mp4 15.36 MB
4. Setup Your KALI Server/1. Get Started with Linux Commands.mp4 75.48 MB
4. Setup Your KALI Server/2. Explore Main Services and Programs.mp4 69.23 MB
5. Steps to Plan a Successful Penetration Test/1. Penetration Testing Cycle.mp4 15.95 MB
5. Steps to Plan a Successful Penetration Test/2. Threat Modeling.mp4 42.74 MB
6. 9+ Ways to Attack a Network/1. Wireshark Simplified.mp4 63.28 MB
6. 9+ Ways to Attack a Network/10. All-in-one Metasploit Framework.mp4 116.53 MB
6. 9+ Ways to Attack a Network/10.1 All-in-one Metasploit Framework.mp4 41.59 MB
6. 9+ Ways to Attack a Network/11. Transfer the Payload to a Windows Machine.mp4 33.68 MB
6. 9+ Ways to Attack a Network/12. Create Your First Trojan and Infiltrate a Target.mp4 126.82 MB
6. 9+ Ways to Attack a Network/13. Explore The Powerful Armitage Tool.mp4 90.03 MB
6. 9+ Ways to Attack a Network/14. Hide a Payload in a JPEG Image.mp4 29.85 MB
6. 9+ Ways to Attack a Network/2. How Does Port Scanning Work.mp4 16.08 MB
6. 9+ Ways to Attack a Network/3. Introducing NMAP.mp4 29.3 MB
6. 9+ Ways to Attack a Network/4. Understand NETBIOS and SMB Attacks.mp4 30.26 MB
6. 9+ Ways to Attack a Network/5. NMAP and ZENMAP Simplified.mp4 118.66 MB
6. 9+ Ways to Attack a Network/6. Execute Man-in-the-Middle Attacks.mp4 76.62 MB
6. 9+ Ways to Attack a Network/7. Perform a DNS Spoofing Attack.mp4 63.59 MB
6. 9+ Ways to Attack a Network/8. Identify a DNS Zone Transfer Vulnerability.mp4 47.88 MB
6. 9+ Ways to Attack a Network/9. Plan DOS and DDOS Attacks.mp4 19.7 MB
7. Attack Modern Wireless Networks/1. Introduction.mp4 61.48 MB
7. Attack Modern Wireless Networks/2. WEP Cracking.mp4 21.36 MB
7. Attack Modern Wireless Networks/3. WPA and WPA2 Cracking.mp4 80.58 MB
7. Attack Modern Wireless Networks/4. WPS Cracking.mp4 50.6 MB
7. Attack Modern Wireless Networks/5. Tips to Improve Your Wireless Network Security.mp4 4.58 MB
8. 4+ Ways to Attack a Web Application/1. Web Applications Security Overview.mp4 14.55 MB
8. 4+ Ways to Attack a Web Application/10. Cross-Site Scripting (XSS) Vulnerabilities.mp4 41.11 MB
8. 4+ Ways to Attack a Web Application/11. Insecure Deserialization Vulnerabilities.mp4 3.9 MB
8. 4+ Ways to Attack a Web Application/12. Using Components with Known Vulnerabilities.mp4 5.18 MB
8. 4+ Ways to Attack a Web Application/13. Insufficient Logging & Monitoring Vulnerabilities.mp4 10.27 MB
8. 4+ Ways to Attack a Web Application/14. Additional Risks to Consider.mp4 4.17 MB
8. 4+ Ways to Attack a Web Application/15. Discover Vulnerabilities in Websites.mp4 120.55 MB
8. 4+ Ways to Attack a Web Application/16. Control Database Server with SQLMap.mp4 113.24 MB
8. 4+ Ways to Attack a Web Application/17. Easily Hack a WordPress Site.mp4 89.21 MB
8. 4+ Ways to Attack a Web Application/18. Intercept, Analyze, and Replay Web Traffic.mp4 98.61 MB
8. 4+ Ways to Attack a Web Application/2. Web Applications Attack Surface.mp4 49.48 MB
8. 4+ Ways to Attack a Web Application/3. Metasploitable VM.mp4 29.38 MB
8. 4+ Ways to Attack a Web Application/4. Injection Vulnerabilities.mp4 20.3 MB
8. 4+ Ways to Attack a Web Application/5. Broken Authentication Vulnerabilities.mp4 28.6 MB
8. 4+ Ways to Attack a Web Application/6. Sensitive Data Exposure Vulnerabilities.mp4 12.86 MB
8. 4+ Ways to Attack a Web Application/7. XML External Entities (XXE) Vulnerabilities.mp4 7.32 MB
8. 4+ Ways to Attack a Web Application/8. Broken Access Control Vulnerabilities.mp4 4.78 MB
8. 4+ Ways to Attack a Web Application/9. Security Misconfiguration Vulnerabilities.mp4 10.27 MB
9. Simple Ways to Gain Access/1. Various Password Attacks.mp4 22.43 MB
9. Simple Ways to Gain Access/2. Hashing in a Nutshell.mp4 39.74 MB
9. Simple Ways to Gain Access/3. Execute an Offline Password Attack on Linux.mp4 91.93 MB
9. Simple Ways to Gain Access/4. Execute an Offline Password Attack on Windows.mp4 74.49 MB
9. Simple Ways to Gain Access/5. Run an Online Password Attack on Linux.mp4 49.96 MB
9. Simple Ways to Gain Access/6. Run an Online Password Attack on a Router.mp4 30.55 MB
9. Simple Ways to Gain Access/7. Crack Passwords with Rainbow Tables.mp4 61.14 MB
9. Simple Ways to Gain Access/8. Design Effective Wordlists.mp4 133.59 MB
9. Simple Ways to Gain Access/9. Password Management Tips.mp4 12.8 MB
其他位置