种子简介
种子名称:
Pluralsight - Penetration Testing and Ethical Hacking with Kali Linux
文件类型:
视频
文件数目:
96个文件
文件大小:
811.84 MB
收录时间:
2017-10-6 22:39
已经下载:
3次
资源热度:
173
最近下载:
2024-11-30 06:40
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:b0deb8e2100963ddd4ddb4f709602370fab25e14&dn=Pluralsight - Penetration Testing and Ethical Hacking with Kali Linux
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Pluralsight - Penetration Testing and Ethical Hacking with Kali Linux.torrent
01. Installing and Configuring Kali Linux/01_01-Introduction.mp41.14MB
01. Installing and Configuring Kali Linux/01_02-Kali Linux 2.0.mp430.85MB
01. Installing and Configuring Kali Linux/01_03-Creating a Virtual Machine.mp430.47MB
01. Installing and Configuring Kali Linux/01_04-Installing Kali Linux.mp416.47MB
01. Installing and Configuring Kali Linux/01_05-Updating Kali Linux.mp413.17MB
01. Installing and Configuring Kali Linux/01_06-Installing Additional Tools on Kali.mp410.19MB
01. Installing and Configuring Kali Linux/01_07-Configuring SSH.mp42.3MB
01. Installing and Configuring Kali Linux/01_08-Being Anonymous with Tor.mp46.54MB
01. Installing and Configuring Kali Linux/01_09-Scan Your System for Rootkits.mp43.32MB
01. Installing and Configuring Kali Linux/01_10-Summary.mp4924.75KB
02. Prepenetration Testing Checklist/02_01-Introduction.mp41.27MB
02. Prepenetration Testing Checklist/02_02-Prepenetration Checklist.mp412.77MB
02. Prepenetration Testing Checklist/02_03-Course Workflow.mp42.59MB
02. Prepenetration Testing Checklist/02_04-Summary.mp4545.07KB
03. Information Gathering/03_01-Introduction.mp41.59MB
03. Information Gathering/03_02-Gathering Information Checklist.mp46.7MB
03. Information Gathering/03_03-Write Down Your Findings Using KeepNote.mp44.37MB
03. Information Gathering/03_04-Visiting the Client Website.mp42.86MB
03. Information Gathering/03_05-Google Hacking Database.mp412.43MB
03. Information Gathering/03_06-Using Some Tools on the Web.mp46.21MB
03. Information Gathering/03_07-Trying Metagoofile to Gather Documents Information.mp44.5MB
03. Information Gathering/03_08-Gather Contacts Information.mp44.05MB
03. Information Gathering/03_09-Whois.mp45.76MB
03. Information Gathering/03_10-DNS Reconnaissance.mp43.59MB
03. Information Gathering/03_11-Deep Magic Information Gathering Tool.mp47.3MB
03. Information Gathering/03_12-Discover Scripts.mp411.59MB
03. Information Gathering/03_13-Playing Around with Reconng.mp419.21MB
03. Information Gathering/03_14-Summary.mp41.42MB
04. External Pentesting/04_01-Introduction.mp41.21MB
04. External Pentesting/04_02-External Penetration Testing Workflow.mp42.38MB
04. External Pentesting/04_03-Traceroute.mp46.84MB
04. External Pentesting/04_04-Host Discovery.mp45.13MB
04. External Pentesting/04_05-Port Scanning.mp413.65MB
04. External Pentesting/04_06-Summary.mp4767.71KB
05. Website Penetration Testing/05_01-Introduction.mp41.06MB
05. Website Penetration Testing/05_02-Website Penetration Testing Workflow.mp42.59MB
05. Website Penetration Testing/05_03-Web Application Firewall Scan.mp41.87MB
05. Website Penetration Testing/05_04-Load Balancer Scan.mp42.03MB
05. Website Penetration Testing/05_05-Website Crawling.mp41.89MB
05. Website Penetration Testing/05_06-Burpsuite Proxy.mp411.44MB
05. Website Penetration Testing/05_07-Burpsuite Target.mp46.9MB
05. Website Penetration Testing/05_08-Burpsuite Spider.mp46.85MB
05. Website Penetration Testing/05_09-Burpsuite Discover Contents.mp411.16MB
05. Website Penetration Testing/05_10-Copy a Website.mp44.34MB
05. Website Penetration Testing/05_11-SSL Scanning.mp46.41MB
05. Website Penetration Testing/05_12-CMS Scanning.mp46.16MB
05. Website Penetration Testing/05_13-Scanning for Web Specific Vulnerabilities.mp426.16MB
05. Website Penetration Testing/05_14-Sessions Tokens Test.mp48.26MB
05. Website Penetration Testing/05_15-Exploiting the SQL Injection.mp48.39MB
05. Website Penetration Testing/05_16-Maintaining Access.mp46.52MB
05. Website Penetration Testing/05_17-Denial of Service Attack.mp418.12MB
05. Website Penetration Testing/05_18-Summary.mp42.17MB
06. Internal Network Penetration Testing/06_01-Introduction.mp4935.34KB
06. Internal Network Penetration Testing/06_02-Internal Penetration Testing Workflow.mp4959.57KB
06. Internal Network Penetration Testing/06_03-Port Scanning the Internal Network.mp45.81MB
06. Internal Network Penetration Testing/06_04-Scanning for Vulnerabilities.mp430.51MB
06. Internal Network Penetration Testing/06_05-Summary.mp4775.8KB
07. Network Sniffing/07_01-Introduction.mp4873.34KB
07. Network Sniffing/07_02-Network Monitoring.mp48.65MB
07. Network Sniffing/07_03-Sniffing with Wireshark.mp410.78MB
07. Network Sniffing/07_04-Detecting MITM.mp423.66MB
07. Network Sniffing/07_05-Detecting a SYN Scan.mp416.91MB
07. Network Sniffing/07_06-Understanding Brute Force Attack.mp411.38MB
07. Network Sniffing/07_07-Discovering a Denial of Service.mp415.74MB
07. Network Sniffing/07_08-Summary.mp41.43MB
08. Exploitation/08_01-Introduction.mp41.05MB
08. Exploitation/08_02-Exploiting Using Metasploit.mp423.41MB
08. Exploitation/08_03-Post Exploitation in Metasploit.mp420.63MB
08. Exploitation/08_04-Persistence.mp47.03MB
08. Exploitation/08_05-Using Meterpreter.mp427.3MB
08. Exploitation/08_06-Armitage.mp414.9MB
08. Exploitation/08_07-Summary.mp41.22MB
09. Social Engineering/09_01-Introduction.mp4797.66KB
09. Social Engineering/09_02-Social Engineering Toolkit.mp416.18MB
09. Social Engineering/09_03-PowerShell Attack.mp412.65MB
09. Social Engineering/09_04-Spear Phishing Attack.mp414.13MB
09. Social Engineering/09_05-Credential Harvester.mp49.39MB
09. Social Engineering/09_06-Summary.mp41.05MB
10. WiFi Penetration Testing/10_01-Introduction.mp41.98MB
10. WiFi Penetration Testing/10_02-Wireless Reconnaissance.mp411MB
10. WiFi Penetration Testing/10_03-WEP Attack.mp420.73MB
10. WiFi Penetration Testing/10_04-WPAWPA2 Attack.mp423.55MB
10. WiFi Penetration Testing/10_05-Bypassing a Hidden ESSID.mp45.89MB
10. WiFi Penetration Testing/10_06-Summary.mp41.23MB
11. Brute Force Attack Testing/11_01-Introduction.mp41.34MB
11. Brute Force Attack Testing/11_02-Brute Forcing SSH.mp45.24MB
11. Brute Force Attack Testing/11_03-Brute Forcing RDP.mp43.59MB
11. Brute Force Attack Testing/11_04-Brute Forcing WebForms Authentication.mp48.79MB
11. Brute Force Attack Testing/11_05-Cracking the Hashes.mp47.15MB
11. Brute Force Attack Testing/11_06-Summary.mp4959.12KB
12. Advanced Penetration Testing/12_01-Introduction.mp4760.94KB
12. Advanced Penetration Testing/12_02-Bypassing the Antivirus.mp418.82MB
12. Advanced Penetration Testing/12_03-Metasploit Rc Scripts.mp46.93MB
12. Advanced Penetration Testing/12_04-Finding Exploits.mp412.22MB
12. Advanced Penetration Testing/12_05-Attacking the Domain Controller.mp416.26MB
12. Advanced Penetration Testing/12_06-Summary.mp41.04MB