[DesireCourse Com] Udemy - Learn Hacking Windows 10 Using Metasploit From Scratch

Photo unavailable
Category:
Date:
11/06/18 at 1:34pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
1.4 GB in 99 files

Torrent Status:
  This torrent has been verified.

Infohash:
23264c0cf54f317f16f81c1456063e945513c23e


File list

  • [DesireCourse Com] Udemy - Learn Hacking Windows 10 Using Metasploit From Scratch
  • icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/001 Download-Kali-Linux-VM.txt 80 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/001 Download-VirtualBox.txt 42 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/001 Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox)-en.srt 6.7 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/001 Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox).mp4 15.1 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/002 Downlaod-VMware-Workstation-.txt 71 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/002 Download-Kali-Linux-VM.txt 80 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/002 Installing Kali Linux 2.0 as a Virtual Machine (VMware)-en.srt 3.9 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/002 Installing Kali Linux 2.0 as a Virtual Machine (VMware).mp4 6.8 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/003 Download-Kali-Linux-ISO.txt 32 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/003 Download-VirtualBox.txt 42 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/003 Installing Kali Linux 2.0 as ISO image-en.srt 7.8 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/003 Installing Kali Linux 2.0 as ISO image.mp4 13.5 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/004 Download-Windows.txt 64 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/004 Setup Windows 10 as a Virtual Machine-en.srt 3.4 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/004 Setup Windows 10 as a Virtual Machine.mp4 6 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/005 Download-Metasploitable.txt 71 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/005 Setup Metasploitable as a Virtual Machine-en.srt 3.8 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/005 Setup Metasploitable as a Virtual Machine.mp4 9.1 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/006 Configure the Network Settings-en.srt 6.7 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/006 Configure the Network Settings.mp4 21.1 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/007 ALFA-AWUS036NH.txt 165 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/007 Connecting Wi-Fi card to the Virtual Machine-en.srt 2.2 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/007 Connecting Wi-Fi card to the Virtual Machine.mp4 6 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/007 TP-Link-N150.txt 145 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/008 Updating Kali Linux-en.srt 2 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/01 Preparing/008 Updating Kali Linux.mp4 6.8 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/009 Introduction-en.srt 3.1 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/009 Introduction.mp4 5.1 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/010 Discovering the connected clients-en.srt 22.2 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/010 Discovering the connected clients.mp4 12.4 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/011 Scanning the target OS (Part 1)-en.srt 21.7 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/011 Scanning the target OS (Part 1).mp4 36.4 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/012 Scanning the target OS (Part 2)-en.srt 13.3 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/012 Scanning the target OS (Part 2).mp4 23.1 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/013 Scanning the target OS using GUI-en.srt 10.7 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/02 Information Gathering/013 Scanning the target OS using GUI.mp4 15.3 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/014 Gaining Access introduction-en.srt 2.4 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/014 Gaining Access introduction.mp4 3.9 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/015 Metasploit Fundamentals-en.srt 18.3 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/015 Metasploit Fundamentals.mp4 63.3 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/016 Creating a Payload using Msfvenom-en.srt 10.1 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/016 Creating a Payload using Msfvenom.mp4 22.6 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/017 Creating an Encoded Payload using Msfvenom-en.srt 8.3 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/017 Creating an Encoded Payload using Msfvenom.mp4 23.6 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/018 Testing the Payload in the target OS-en.srt 11.5 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/03 Gaining Access/018 Testing the Payload in the target OS.mp4 26.1 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/019 Introduction-en.srt 1.9 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/019 Introduction.mp4 2.8 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/020 Installing Veil Framework-en.srt 5.2 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/020 Installing Veil Framework.mp4 19.3 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/021 Creating an undetectable Payload-en.srt 11.4 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/021 Creating an undetectable Payload.mp4 29.2 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/022 Combine an EXE file with the Payload (1st method)-en.srt 13.6 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/022 Combine an EXE file with the Payload (1st method).mp4 33.9 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/022 List-of-payloads-types.txt 78 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/023 Combine an EXE file with the Payload (2nd method)-en.srt 8.3 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/023 Combine an EXE file with the Payload (2nd method).mp4 23.8 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/023 Download-Shellter.txt 42 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/024 autoit-download-and-execute.txt 83 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/024 Combine the Payload with an ImagePDFMP3 etc....-en.srt 16.6 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/024 Combine the Payload with an ImagePDFMP3 etc.....mp4 50.7 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/024 Converting-Service.txt 47 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/024 Download-Autoit.txt 52 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/025 Combine the Payload with an Excel Word file-en.srt 14.6 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/025 Combine the Payload with an Excel Word file.mp4 33.4 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/025 MacroShop.txt 39 B
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/026 Spoofing the Backdoor extension-en.srt 10.9 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/04 Encoding and Combining the Payload/026 Spoofing the Backdoor extension.mp4 28.2 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/027 Introduction-en.srt 1.9 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/027 Introduction.mp4 3.5 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/028 Interact with the Target Computer (Part 1)-en.srt 10 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/028 Interact with the Target Computer (Part 1).mp4 28.9 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/029 Interact with the Target Computer (Part 2)-en.srt 9.9 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/029 Interact with the Target Computer (Part 2).mp4 27.3 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/030 Persist your connection in the target OS-en.srt 11.7 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/030 Persist your connection in the target OS.mp4 30 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/031 Escalate your privileges in Windows 10-en.srt 7.7 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/031 Escalate your privileges in Windows 10.mp4 28.4 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/032 Escalate your privileges in Windows 8.187-en.srt 11.9 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/032 Escalate your privileges in Windows 8.187.mp4 19.8 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/033 Migrating the Backdoor with the running processes-en.srt 11.4 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/033 Migrating the Backdoor with the running processes.mp4 30.2 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/034 Check the virtualization Clear log event-en.srt 9.6 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/034 Check the virtualization Clear log event.mp4 20.8 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/035 Uninstalling programs from the target OS-en.srt 8.1 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/035 Uninstalling programs from the target OS.mp4 20.5 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/036 AddRemove users and changing the Admin password-en.srt 7.5 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/036 AddRemove users and changing the Admin password.mp4 20.9 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/037 What is Pivoting-en.srt 49.7 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/037 What is Pivoting.mp4 44.7 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/040 Stealing the target Wi-Fi password-en.srt 12.2 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/040 Stealing the target Wi-Fi password.mp4 30.3 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/041 Capture the keystrokes of the target keyboard-en.srt 34 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/041 Capture the keystrokes of the target keyboard.mp4 24.5 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/042 Stealing Windows credentials-en.srt 11.2 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/042 Stealing Windows credentials.mp4 25.8 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/043 Cracking the administrator password-en.srt 41 KB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/043 Cracking the administrator password.mp4 30.3 MB
    icon learn-hacking-10-windows-using-metasploit-from-scratch/05 Post Exploitation/044 Download-Lazagne.txt 48 B

Similar Torrents