种子简介
种子名称:
[ DevCourseWeb.com ] Udemy - Hacking Wireless Networks. Theory and practice
文件类型:
视频
文件数目:
25个文件
文件大小:
967.27 MB
收录时间:
2024-2-26 10:56
已经下载:
3次
资源热度:
118
最近下载:
2024-11-26 14:44
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:81e2233b4a3521619c7df7e91b7f3b2d794a076f&dn=[ DevCourseWeb.com ] Udemy - Hacking Wireless Networks. Theory and practice
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[ DevCourseWeb.com ] Udemy - Hacking Wireless Networks. Theory and practice.torrent
~Get Your Files Here !/04 - Introduction to wireless networks/006 Wireless network interface cards in Linux.mp48.03MB
~Get Your Files Here !/05 - Wireless security (half) measures An overview/002 Changing the MAC address of the wireless network card.mp416.31MB
~Get Your Files Here !/05 - Wireless security (half) measures An overview/004 Finding a hidden access point with disabled ESSID broadcast.mp415.37MB
~Get Your Files Here !/06 - Wireless network attacks independent of used encryption/004 The use of deauthentication attack for jamming network traffic.mp414.56MB
~Get Your Files Here !/07 - WEP attacks/004 The overview and demonstration of the chop-chop attack.mp413.77MB
~Get Your Files Here !/07 - WEP attacks/006 Generating packets without knowing the network key.mp414.09MB
~Get Your Files Here !/07 - WEP attacks/007 Interactive packet replay and ARP request replay.mp420.11MB
~Get Your Files Here !/07 - WEP attacks/008 The demonstration of the PTW and KoreK attacks.mp412MB
~Get Your Files Here !/07 - WEP attacks/010 Creating a fake access point – the Caffe Latte attack.mp49.91MB
~Get Your Files Here !/08 - WPA attacks/003 The dictionary attack on WPA.mp412.34MB
~Get Your Files Here !/08 - WPA attacks/006 The dictionary attack on WPA – using hash tables.mp48.91MB
~Get Your Files Here !/09 - CUDA-powered attacks/002 CUDA – the initial preparation of the environment.mp47.22MB
~Get Your Files Here !/09 - CUDA-powered attacks/003 The installation of CUDA-SDK and CUDA-Toolkit.mp414.63MB
~Get Your Files Here !/09 - CUDA-powered attacks/004 The compilation and installation of the tools with CUDA support.mp428.41MB
~Get Your Files Here !/09 - CUDA-powered attacks/005 The optimization of the parameters of an nVidia video card.mp419.45MB
~Get Your Files Here !/09 - CUDA-powered attacks/006 CUDA – preparation for the attack.mp49.44MB
~Get Your Files Here !/09 - CUDA-powered attacks/007 CUDA – the attack on WPA.mp435.56MB
~Get Your Files Here !/09 - CUDA-powered attacks/008 Generating your own dictionary.mp49.01MB
~Get Your Files Here !/09 - CUDA-powered attacks/009 Applications for cracking MD4 and MD5 hashes with the use of CUDA technology.mp420.73MB
~Get Your Files Here !/13 - Rootkits and Stealth Apps Creating and Revealing v2.0 course/001 Writing a shellcode.mp4179.88MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/001 Become CISS Certified Hacking Training Monitoring - What you will learn.mp44.85MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/002 Become CISS Certified Hacking Training Monitoring Transmitted Data.mp4261.49MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/003 Become CISS Certified Hacking Training WiFi Security - What you will learn.mp44.52MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/004 Become CISS Certified Hacking Training WiFi Security - Overview and sol.mp4137.09MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/005 Become CISS Certified Hacking Training WiFi Security - Threats.mp489.59MB