zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
[FreeUdemy.Me] Kali Linux, Ethical Hacking and Pen Testing for Beginners
magnet:?xt=urn:btih:a89ef6b3df1bb9eff52bbe1380cdee01797f7c60&dn=[FreeUdemy.Me] Kali Linux, Ethical Hacking and Pen Testing for Beginners
磁力链接详情
Hash值:
a89ef6b3df1bb9eff52bbe1380cdee01797f7c60
点击数:
268
文件大小:
1.2 GB
文件数量:
42
创建日期:
2017-6-3 02:10
最后访问:
2024-12-26 19:25
访问标签:
FreeUdemy
Me
Kali
Linux
Ethical
Hacking
and
Pen
Testing
for
Beginners
文件列表详情
01 Introduction to Ethical Hacking and Security Industry Terminology/001 Course Intro.mp4 23.04 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/002 OSI Model and CIA.mp4 70.59 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/003 Spoofing and Hijacking.mp4 38.71 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/004 Cross Site Scripting Cross Site Request Forgery.mp4 42.99 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/005 SQL Injection.mp4 17.16 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/006 Wireless Network Security.mp4 30.74 MB
01 Introduction to Ethical Hacking and Security Industry Terminology/007 Common Malware.mp4 42.07 MB
02 Kali 101/008 About Kali and use cases.mp4 5.96 MB
02 Kali 101/009 Installing and configuring Kali on a VMware Virtual Machine.mp4 10.4 MB
02 Kali 101/010 Configuring the network adapter.mp4 8.54 MB
02 Kali 101/011 Booting Kali for the first time.mp4 7.49 MB
02 Kali 101/012 Basic commands with Kali and VMware.mp4 8.07 MB
02 Kali 101/013 Basic Kali Configuration.mp4 4.16 MB
02 Kali 101/014 Configuring your network.mp4 4.24 MB
02 Kali 101/015 Requesting and Configuring IP Addresses.mp4 7.94 MB
02 Kali 101/016 Managing services in Kali.mp4 5.96 MB
02 Kali 101/017 Managing Apache in Kali.mp4 12.08 MB
02 Kali 101/018 Managing SSH in Kali.mp4 4.47 MB
02 Kali 101/019 Managing MySQL in Kali.mp4 12.04 MB
02 Kali 101/020 Vulnerability Analysis Tools Overview.mp4 8.22 MB
02 Kali 101/021 Tools Overview.mp4 4.39 MB
02 Kali 101/022 Information Gathering Tools Overview.mp4 3.81 MB
02 Kali 101/023 Maltego.mp4 5.39 MB
02 Kali 101/024 Web Applications Tools Overview.mp4 6.48 MB
02 Kali 101/025 Burp Suite.mp4 5.06 MB
02 Kali 101/026 Password Attacks Tools Overview.mp4 2.93 MB
02 Kali 101/027 Ophcrack.mp4 4.48 MB
02 Kali 101/028 Armitage.mp4 6.11 MB
02 Kali 101/029 Cracking Wi-Fi Passwords on a WEP Network.mp4 181.96 MB
02 Kali 101/030 Top 10 Security Tools Overview.mp4 8.5 MB
03 Penetration Testing Methodologies/031 Penetration Testing.mp4 55.73 MB
03 Penetration Testing Methodologies/032 Pen-Testing Techniques.mp4 75.87 MB
03 Penetration Testing Methodologies/033 Scope of Pen-Testing.mp4 70.78 MB
03 Penetration Testing Methodologies/034 Types of Pen-Testing and its Strategies Part 1.mp4 66.49 MB
03 Penetration Testing Methodologies/035 Types of Pen-Testing and its Strategies Part 2.mp4 47.24 MB
03 Penetration Testing Methodologies/036 Types of Pen-Testing and its Strategies Part 3.mp4 68.52 MB
03 Penetration Testing Methodologies/037 Types of Pen-Testing and its Strategies Part 4.mp4 79.21 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/038 Injecting MySQL Logs.mp4 31.63 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/039 Threat Actor Attribution.mp4 24.1 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/040 Understanding Heap Overflow Protection.mp4 21.13 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/041 Source Code Fuzzing Lab Crash Analysis using American Fuzzy Lop.mp4 47.58 MB
04 BONUS Labs on Source Code Fuzzing Infecting MySQL logs and more/042 Intercepting Process Injection on Suspended Threads.mp4 49.98 MB
其他位置