本站已收录 番号和无损神作磁力链接/BT种子 

Pluralsight - Exploit Development and Execution with the Metasploit Framework

种子简介

种子名称: Pluralsight - Exploit Development and Execution with the Metasploit Framework
文件类型: 视频
文件数目: 46个文件
文件大小: 672.87 MB
收录时间: 2017-9-7 15:23
已经下载: 3
资源热度: 267
最近下载: 2024-11-6 04:44

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:b1bb62cc435c55cf8639706ef58af595b4cb19af&dn=Pluralsight - Exploit Development and Execution with the Metasploit Framework 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

Pluralsight - Exploit Development and Execution with the Metasploit Framework.torrent
  • 02 Fundamentals of Reverse_Engineering/07 - Assembly Instructions_.mp419.85MB
  • 02 Fundamentals of Reverse_Engineering/11 - Analyzing_the Stack..mp456.76MB
  • 02 Fundamentals of Reverse_Engineering/09 - 32_bit Reverse Engineering Demo.mp464.97MB
  • 02 Fundamentals of Reverse_Engineering/12 - Practicing Reverse Engineering.mp43.91MB
  • 02 Fundamentals of Reverse_Engineering/10 - 64-bit Reverse Engineering Demo.mp417.56MB
  • 02 Fundamentals of Reverse_Engineering/04 - 32bit Debugger Basics.mp466.99MB
  • 02 Fundamentals of Reverse_Engineering/02 - Introduction.mp42.26MB
  • 02 Fundamentals of Reverse_Engineering/13 - Summary.mp41.84MB
  • 02 Fundamentals of Reverse_Engineering/03 - Debuggers Installtion.mp424.85MB
  • 02 Fundamentals of Reverse_Engineering/06 - Fundamentals of Assembly Language.mp420.4MB
  • 02 Fundamentals of Reverse_Engineering/08 - More About the Assembly Language.mp46.27MB
  • 02 Fundamentals of Reverse_Engineering/05 _ 64-bit Debugger Basics.mp430.26MB
  • 06 Assembly Tricks to Locate Shellcode/37 - The Power of the Assembly Language.mp49.98MB
  • 06 Assembly Tricks to Locate Shellcode/38 - Summary.mp41.74MB
  • 06 Assembly Tricks to Locate Shellcode/36 - Executing the Shellcode.mp418.24MB
  • 06 Assembly Tricks to Locate Shellcode/33 - Introduction.mp41.6MB
  • 06 Assembly Tricks to Locate Shellcode/34 - Getting and Installing the Tools.mp416.8MB
  • 06 Assembly Tricks to Locate Shellcode/35 - Analyzing the Exploit.mp438.73MB
  • 04 Stack Overflow Exploitation/25 - Shellcode Creation.mp49.37MB
  • 04 Stack Overflow Exploitation/26 - Summary.mp41.67MB
  • 04 Stack Overflow Exploitation/23 _ Controlling EIP.mp420.96MB
  • 04 Stack Overflow Exploitation/20 - Introduction.mp41.13MB
  • 04 Stack Overflow Exploitation/22 _ Building a Fuzzer.mp412.21MB
  • 04 Stack Overflow Exploitation/21 _ Exploitation Tools.mp419.24MB
  • 04 Stack Overflow Exploitation/24 _ Finding a Home for the Shellcode.mp414.48MB
  • 05 Porting Exploits to the Metasploit Framework/31 - Finalizing the Module Class.mp49.68MB
  • 05 Porting Exploits to the Metasploit Framework/32 - Summary.mp41.6MB
  • 05 Porting Exploits to the Metasploit Framework/29 - Configuring the Exploit Options.mp410.71MB
  • 05 Porting Exploits to the Metasploit Framework/30 - Implementing the Exploit Method.mp413.07MB
  • 05 Porting Exploits to the Metasploit Framework/27 - Introduction.mp41.33MB
  • 05 Porting Exploits to the Metasploit Framework/28 - Analyzing an Existing Module Class.mp46.97MB
  • 01 Course Overview/01. Course Overview.mp47.78MB
  • 03 Basics_ of Stack Overflows/14 - Introduction.mp42.07MB
  • 03 Basics_ of Stack Overflows/19 - Summary.mp41.28MB
  • 03 Basics_ of Stack Overflows/18 - Stack Overflow Analysis.mp48.53MB
  • 03 Basics_ of Stack Overflows/17 - Smashing the_Stack.mp413.37MB
  • 03 Basics_ of Stack Overflows/16 - Reverse Engineering Your C Program_.mp417.62MB
  • 03 Basics_ of Stack Overflows/15 - Analyzing a Vulnerable C Module.mp48.4MB
  • 07 Structured Exception_Handler/42. Manipulating SEH and nSEH.mp424.52MB
  • 07 Structured Exception_Handler/45. Exploitation in Practice.mp48.73MB
  • 07 Structured Exception_Handler/44. Executing the Shellcode.mp49.94MB
  • 07 Structured Exception_Handler/41. Corrupting the SEH Chain.mp411.82MB
  • 07 Structured Exception_Handler/43. More Analysis with Mona.mp420.83MB
  • 07 Structured Exception_Handler/39. Introduction.mp44.91MB
  • 07 Structured Exception_Handler/46. Summary.mp41.77MB
  • 07 Structured Exception_Handler/40. Installing the Vulnerable Application.mp45.86MB