[CourseClub.NET] Packtpub - End-to-End Penetration Testing with Kali Linux

Photo unavailable
Category:
Date:
11/04/18 at 5:11am GMT+1
Submitter:
Seeders:
2
Leechers:
0
File size:
1.6 GB in 58 files

Torrent Status:
  This torrent has been verified.

Infohash:
6a99f29552a1a465ebff20531727524abcef6cb1


File list

  • [CourseClub.NET] Packtpub - End-to-End Penetration Testing with Kali Linux
  • icon 01.Welcome/0101.The Course Overview.mp4 13.4 MB
    icon 01.Welcome/0102.How to Get the Most Out of This Course.mp4 12.1 MB
    icon 01.Welcome/0103.Teaser Hack Updated Windows10 Using Kali Linux.mp4 46.4 MB
    icon 01.Welcome/0104.Kali Linux Basics.mp4 27.4 MB
    icon 02.Lab Setup/0201.Download and Install VMware Workstation.mp4 13.6 MB
    icon 02.Lab Setup/0202.Download Windows and Kali Linux.mp4 38 MB
    icon 02.Lab Setup/0203.Installation of Windows and Kali Linux.mp4 13.8 MB
    icon 02.Lab Setup/0204.Update the Kali Linux Operating System.mp4 25.1 MB
    icon 03.Terminal Commands/0301.File Commands.mp4 18.9 MB
    icon 03.Terminal Commands/0302.Directory Commands.mp4 24 MB
    icon 03.Terminal Commands/0303.Chain Commands.mp4 24.1 MB
    icon 03.Terminal Commands/0304.Manage Services.mp4 13.5 MB
    icon 04.Information Gathering/0401.Using the NetDiscover Tool.mp4 22.4 MB
    icon 04.Information Gathering/0402.Using the Nmap Tool.mp4 29.1 MB
    icon 04.Information Gathering/0403.Using the Sparta Tool.mp4 15 MB
    icon 04.Information Gathering/0404.Using the Maltego Tool.mp4 41.2 MB
    icon 04.Information Gathering/0405.Using the Recon-NG Tool.mp4 33.8 MB
    icon 05.Vulnerability Analysis/0501.Using the Burp Suite Tool.mp4 42.8 MB
    icon 05.Vulnerability Analysis/0502.Using the ZAP Tool.mp4 37.2 MB
    icon 05.Vulnerability Analysis/0503.WordPress Scanning Using WPScan.mp4 65.7 MB
    icon 05.Vulnerability Analysis/0504.Nessus Installation.mp4 29.7 MB
    icon 05.Vulnerability Analysis/0505.Vulnerability Analysis Using Nessus.mp4 41.3 MB
    icon 05.Vulnerability Analysis/0506.Analyze the Web Using HTTrack.mp4 33.5 MB
    icon 06.Database Hacking/0601.Using the SQLite Tool.mp4 37.9 MB
    icon 06.Database Hacking/0602.Using the Sqlmap Tool.mp4 48.4 MB
    icon 06.Database Hacking/0603.Using the JSQL Tool.mp4 35 MB
    icon 06.Database Hacking/0604.Using SQLsus.mp4 35.8 MB
    icon 07.Password Cracking/0701.Using Crunch Commands.mp4 27.8 MB
    icon 07.Password Cracking/0702.Using John the Ripper Tool.mp4 24.5 MB
    icon 07.Password Cracking/0703.FTP Setup.mp4 36.6 MB
    icon 07.Password Cracking/0704.Using Hydra.mp4 45 MB
    icon 07.Password Cracking/0705.Using Medusa.mp4 42.3 MB
    icon 07.Password Cracking/0706.Using Ncrack.mp4 17.2 MB
    icon 08.Man-in-the-Middle AttackSniffing/0801.Using the MAC Changer Tool.mp4 26.5 MB
    icon 08.Man-in-the-Middle AttackSniffing/0802.Using the Wireshark Tool.mp4 38.3 MB
    icon 08.Man-in-the-Middle AttackSniffing/0803.Using the Ettercap Tool.mp4 31.2 MB
    icon 08.Man-in-the-Middle AttackSniffing/0804.Using MITMProxy and Driftnet Tool.mp4 20.2 MB
    icon 09.Social Engineering Attack/0901.Phishing Attack Using SET.mp4 36 MB
    icon 09.Social Engineering Attack/0902.Trojan Attack Using SET.mp4 42.9 MB
    icon 09.Social Engineering Attack/0903.Using the Maltego Tool.mp4 32.2 MB
    icon 09.Social Engineering Attack/0904.Using Browser Exploitation Framework.mp4 29.3 MB
    icon 10.Wireless Hacking/1001.About Wireless Adapter.mp4 15.7 MB
    icon 10.Wireless Hacking/1002.Start Monitor Mode.mp4 21.9 MB
    icon 10.Wireless Hacking/1003.Hack WEP Using the Fern Tool.mp4 34.2 MB
    icon 10.Wireless Hacking/1004.Create a Dictionary.mp4 14.5 MB
    icon 10.Wireless Hacking/1005.Hack WPAWPA2WPA2-PSK.mp4 23.2 MB
    icon 11.Exploitation Techniques/1101.Metasploit Basics.mp4 34.3 MB
    icon 11.Exploitation Techniques/1102.AV Bypass Frameworks.mp4 25.3 MB
    icon 11.Exploitation Techniques/1103.Bypass Target Defender.mp4 28.5 MB
    icon 11.Exploitation Techniques/1104.Bypass Target Antivirus.mp4 33.1 MB
    icon 12.Post-Exploitation Techniques/1201.Meterpreter Commands.mp4 47.2 MB
    icon 12.Post-Exploitation Techniques/1202.Insert Keylogger.mp4 14.7 MB
    icon 12.Post-Exploitation Techniques/1203.Privilege Escalation.mp4 22.6 MB
    icon 12.Post-Exploitation Techniques/1204.Stealing Login Credentials.mp4 24.5 MB
    icon 13.Reporting/1301.Using Leafpad.mp4 11 MB
    icon 13.Reporting/1302.Using CutyCapt.mp4 21.6 MB
    icon 13.Reporting/1303.Using Faraday IDE.mp4 17 MB
    icon 13.Reporting/1304.Using recordMyDesktop.mp4 20.5 MB

Similar Torrents