zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Pluralsight - Exploit Development and Executon with Metasploit
magnet:?xt=urn:btih:51caccc00322e8f07241db1ea591e8a2a98d4821&dn=Pluralsight - Exploit Development and Executon with Metasploit
磁力链接详情
Hash值:
51caccc00322e8f07241db1ea591e8a2a98d4821
点击数:
216
文件大小:
672.87 MB
文件数量:
46
创建日期:
2017-5-31 14:57
最后访问:
2024-12-22 14:54
访问标签:
Pluralsight
-
Exploit
Development
and
Executon
with
Metasploit
文件列表详情
01 Course Overview/01. Course Overview.mp4 7.78 MB
02 Fundamentals of Reverse_Engineering/04 - 32bit Debugger Basics.mp4 66.99 MB
02 Fundamentals of Reverse_Engineering/09 - 32_bit Reverse Engineering Demo.mp4 64.97 MB
02 Fundamentals of Reverse_Engineering/11 - Analyzing_the Stack..mp4 56.76 MB
02 Fundamentals of Reverse_Engineering/05 _ 64-bit Debugger Basics.mp4 30.26 MB
02 Fundamentals of Reverse_Engineering/03 - Debuggers Installtion.mp4 24.85 MB
02 Fundamentals of Reverse_Engineering/06 - Fundamentals of Assembly Language.mp4 20.4 MB
02 Fundamentals of Reverse_Engineering/07 - Assembly Instructions_.mp4 19.85 MB
02 Fundamentals of Reverse_Engineering/10 - 64-bit Reverse Engineering Demo.mp4 17.56 MB
02 Fundamentals of Reverse_Engineering/08 - More About the Assembly Language.mp4 6.27 MB
02 Fundamentals of Reverse_Engineering/12 - Practicing Reverse Engineering.mp4 3.91 MB
02 Fundamentals of Reverse_Engineering/02 - Introduction.mp4 2.26 MB
02 Fundamentals of Reverse_Engineering/13 - Summary.mp4 1.84 MB
03 Basics_ of Stack Overflows/16 - Reverse Engineering Your C Program_.mp4 17.62 MB
03 Basics_ of Stack Overflows/17 - Smashing the_Stack.mp4 13.37 MB
03 Basics_ of Stack Overflows/18 - Stack Overflow Analysis.mp4 8.53 MB
03 Basics_ of Stack Overflows/15 - Analyzing a Vulnerable C Module.mp4 8.4 MB
03 Basics_ of Stack Overflows/14 - Introduction.mp4 2.07 MB
03 Basics_ of Stack Overflows/19 - Summary.mp4 1.28 MB
04 Stack Overflow Exploitation/23 _ Controlling EIP.mp4 20.96 MB
04 Stack Overflow Exploitation/21 _ Exploitation Tools.mp4 19.24 MB
04 Stack Overflow Exploitation/24 _ Finding a Home for the Shellcode.mp4 14.48 MB
04 Stack Overflow Exploitation/22 _ Building a Fuzzer.mp4 12.21 MB
04 Stack Overflow Exploitation/25 - Shellcode Creation.mp4 9.37 MB
04 Stack Overflow Exploitation/26 - Summary.mp4 1.67 MB
04 Stack Overflow Exploitation/20 - Introduction.mp4 1.13 MB
05 Porting Exploits to the Metasploit Framework/30 - Implementing the Exploit Method.mp4 13.07 MB
05 Porting Exploits to the Metasploit Framework/29 - Configuring the Exploit Options.mp4 10.71 MB
05 Porting Exploits to the Metasploit Framework/31 - Finalizing the Module Class.mp4 9.68 MB
05 Porting Exploits to the Metasploit Framework/28 - Analyzing an Existing Module Class.mp4 6.97 MB
05 Porting Exploits to the Metasploit Framework/32 - Summary.mp4 1.6 MB
05 Porting Exploits to the Metasploit Framework/27 - Introduction.mp4 1.33 MB
06 Assembly Tricks to Locate Shellcode/35 - Analyzing the Exploit.mp4 38.73 MB
06 Assembly Tricks to Locate Shellcode/36 - Executing the Shellcode.mp4 18.24 MB
06 Assembly Tricks to Locate Shellcode/34 - Getting and Installing the Tools.mp4 16.8 MB
06 Assembly Tricks to Locate Shellcode/37 - The Power of the Assembly Language.mp4 9.98 MB
06 Assembly Tricks to Locate Shellcode/38 - Summary.mp4 1.74 MB
06 Assembly Tricks to Locate Shellcode/33 - Introduction.mp4 1.6 MB
07 Structured Exception_Handler/42. Manipulating SEH and nSEH.mp4 24.52 MB
07 Structured Exception_Handler/43. More Analysis with Mona.mp4 20.83 MB
07 Structured Exception_Handler/41. Corrupting the SEH Chain.mp4 11.82 MB
07 Structured Exception_Handler/44. Executing the Shellcode.mp4 9.94 MB
07 Structured Exception_Handler/45. Exploitation in Practice.mp4 8.73 MB
07 Structured Exception_Handler/40. Installing the Vulnerable Application.mp4 5.86 MB
07 Structured Exception_Handler/39. Introduction.mp4 4.91 MB
07 Structured Exception_Handler/46. Summary.mp4 1.77 MB
其他位置