[openssource.biz] Анатомия кибератаки

Photo unavailable
Category:
Date:
09/01/19 at 6:36pm GMT+1
Submitter:
Seeders:
0
Leechers:
1
File size:
3.6 GB in 99 files

Torrent Status:
  This torrent has NOT been verified. 

Infohash:
b6ed435fa88aa71a1a054a4fa7a130fbc8655711


File list

  • [openssource.biz] Анатомия кибератаки
  • icon 01 Welcome to The Anatomy of a Cyber Attack/001 Introduction (...and now the moment youve all been waiting for)-en.srt 2.9 KB
    icon 01 Welcome to The Anatomy of a Cyber Attack/001 Introduction (...and now the moment youve all been waiting for).mp4 43 MB
    icon 01 Welcome to The Anatomy of a Cyber Attack/002 Creating Our Lab Environment (...our own special little place to hack)-en.srt 5.5 KB
    icon 01 Welcome to The Anatomy of a Cyber Attack/002 Creating Our Lab Environment (...our own special little place to hack).mp4 73.5 MB
    icon 01 Welcome to The Anatomy of a Cyber Attack/003 Installing Kali Linux (...our attack platform)-en.srt 4.9 KB
    icon 01 Welcome to The Anatomy of a Cyber Attack/003 Installing Kali Linux (...our attack platform).mp4 52.5 MB
    icon 01 Welcome to The Anatomy of a Cyber Attack/004 An Important Course Message-en.srt 2.4 KB
    icon 01 Welcome to The Anatomy of a Cyber Attack/004 An Important Course Message.mp4 9.8 MB
    icon 01 Welcome to The Anatomy of a Cyber Attack/005 Installing Windows (...our first victim)-en.srt 6.4 KB
    icon 01 Welcome to The Anatomy of a Cyber Attack/005 Installing Windows (...our first victim).mp4 12.9 MB
    icon 01 Welcome to The Anatomy of a Cyber Attack/006 Installing Metasploitable (...another victim for our amusement)-en.srt 5.1 KB
    icon 01 Welcome to The Anatomy of a Cyber Attack/006 Installing Metasploitable (...another victim for our amusement).mp4 79.5 MB
    icon 01 Welcome to The Anatomy of a Cyber Attack/007 Create Your Own Lab Environment.html 1.6 KB
    icon 02 Security (...and the threats to it)/008 The CIA Triad (...we arent talking about intelligence)-en.srt 13.7 KB
    icon 02 Security (...and the threats to it)/008 The CIA Triad (...we arent talking about intelligence).mp4 165.6 MB
    icon 02 Security (...and the threats to it)/008 The-CIA-Triad.we-arent-talking-about-intelligence.pdf 3.2 MB
    icon 02 Security (...and the threats to it)/009 Hackers Crackers and Attackers (...Oh My)-en.srt 15.4 KB
    icon 02 Security (...and the threats to it)/009 Hackers Crackers and Attackers (...Oh My).mp4 230.1 MB
    icon 02 Security (...and the threats to it)/009 Hackers-Crackers-and-Attackers.Oh-My.pdf 6.7 MB
    icon 03 The Hacker Methodology (...a malicious mindset)/010 Hackers-Methodology.a-malicious-mindset.pdf 14 MB
    icon 03 The Hacker Methodology (...a malicious mindset)/010 The Hackers Methodology (...a malicious mindset)-en.srt 13.6 KB
    icon 03 The Hacker Methodology (...a malicious mindset)/010 The Hackers Methodology (...a malicious mindset).mp4 196.2 MB
    icon 03 The Hacker Methodology (...a malicious mindset)/011 Ethical Hackers (...isnt that an oxymoron)-en.srt 6.4 KB
    icon 03 The Hacker Methodology (...a malicious mindset)/011 Ethical Hackers (...isnt that an oxymoron).mp4 95.9 MB
    icon 03 The Hacker Methodology (...a malicious mindset)/011 Ethical-Hackers.isnt-that-an-oxymoron.pdf 8.2 MB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/012 Reconnaissance (...I can see you but you cant see me)-en.srt 40.3 KB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/012 Reconnaissance (...I can see you but you cant see me).mp4 179.5 MB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/012 Reconnaissance-Phase.pdf 18.1 MB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/013 Getting-Creepy.pdf 3.5 MB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/013 jkakavas-creepy-show-2-ga861ee3.tar.gz 3.4 MB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/013 Lab (...Getting Creepy)-en.srt 21.3 KB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/013 Lab (...Getting Creepy).mp4 208 MB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/014 Lab (...OSINT with CentralOps)-en.srt 27.7 KB
    icon 04 Step 1 Reconnaissance (...I can see you but you cant see me)/014 Lab (...OSINT with CentralOps).mp4 157.2 MB
    icon 05 Step 2 Scanning and Enumeration (...poke poke poke)/015 Scanning and Enumeration (...poke poke poke)-en.srt 36.3 KB
    icon 05 Step 2 Scanning and Enumeration (...poke poke poke)/015 Scanning and Enumeration (...poke poke poke).mp4 573 MB
    icon 05 Step 2 Scanning and Enumeration (...poke poke poke)/015 Scanning-and-Enumeration-Phase.pdf 43.4 MB
    icon 05 Step 2 Scanning and Enumeration (...poke poke poke)/016 Lab Introduction and Setup (...youve got to find the hole)-en.srt 8.7 KB
    icon 05 Step 2 Scanning and Enumeration (...poke poke poke)/016 Lab Introduction and Setup (...youve got to find the hole).mp4 92.3 MB
    icon 05 Step 2 Scanning and Enumeration (...poke poke poke)/017 Lab (...youve got to find the hole)-en.srt 30.2 KB
    icon 05 Step 2 Scanning and Enumeration (...poke poke poke)/017 Lab (...youve got to find the hole).mp4 178.5 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/018 Gaining Access (...finding a foothold)-en.srt 9.5 KB
    icon 06 Step 3 Gaining Access (...finding my foothold)/018 Gaining Access (...finding a foothold).mp4 105.6 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/018 Gaining-Access-Phase.finding-a-foothold.pdf 19.8 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/019 Buffer Overflows (...dissecting the exploit)-en.srt 12.7 KB
    icon 06 Step 3 Gaining Access (...finding my foothold)/019 Buffer Overflows (...dissecting the exploit).mp4 37.9 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/019 Buffer-Overflows.dissecting-the-exploit.pdf 18.4 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/020 Buffer-Overflows.pdf 3.8 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/020 Lab Buffer Overflows (...dissecting the exploit)-en.srt 6.2 KB
    icon 06 Step 3 Gaining Access (...finding my foothold)/020 Lab Buffer Overflows (...dissecting the exploit).mp4 13.8 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/021 Introduction to Shellcode (...finding my foothold)-en.srt 13.4 KB
    icon 06 Step 3 Gaining Access (...finding my foothold)/021 Introduction to Shellcode (...finding my foothold).mp4 32.5 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/021 Introduction-to-Shellcode.finding-my-foothold.pdf 11.4 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/022 The MS08-067 Vulnerability (...aka everyones first hack)-en.srt 10.7 KB
    icon 06 Step 3 Gaining Access (...finding my foothold)/022 The MS08-067 Vulnerability (...aka everyones first hack).mp4 34.7 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/022 The-MS08-067-Vulnerability.aka-everyones-first-hack.pdf 13.6 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/023 Exploiting-Windows.pdf 3.6 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/023 Lab Exploiting Windows (...making it look easy)-en.srt 13.9 KB
    icon 06 Step 3 Gaining Access (...finding my foothold)/023 Lab Exploiting Windows (...making it look easy).mp4 94.8 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/024 Meterpreter (...a crowd favorite for payloads)-en.srt 20.4 KB
    icon 06 Step 3 Gaining Access (...finding my foothold)/024 Meterpreter (...a crowd favorite for payloads).mp4 70.7 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/024 Meterpreter.a-crowd-favorite-for-payloads.pdf 9.5 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/025 Lab (...give em an inch they take a mile)-en.srt 13 KB
    icon 06 Step 3 Gaining Access (...finding my foothold)/025 Lab (...give em an inch they take a mile).mp4 109.4 MB
    icon 06 Step 3 Gaining Access (...finding my foothold)/025 Using-Meterpreter.pdf 3.6 MB
    icon 07 Step 4 Escalation of Privileges (...Ive got the power)/026 Escalation of Privileges (...Ive got the power)-en.srt 25.5 KB
    icon 07 Step 4 Escalation of Privileges (...Ive got the power)/026 Escalation of Privileges (...Ive got the power).mp4 98.6 MB
    icon 07 Step 4 Escalation of Privileges (...Ive got the power)/026 Escalation-of-Privileges.Ive-got-the-power.pdf 31.2 MB
    icon 07 Step 4 Escalation of Privileges (...Ive got the power)/027 Lab (...become superman without the fear of kryptonite)-en.srt 29.4 KB
    icon 07 Step 4 Escalation of Privileges (...Ive got the power)/027 Lab (...become superman without the fear of kryptonite).mp4 65.2 MB
    icon 08 Step 5 Maintaining Access (...hold on tight)/028 Maintaining Access (...hold on tight)-en.srt 9.4 KB
    icon 08 Step 5 Maintaining Access (...hold on tight)/028 Maintaining Access (...hold on tight).mp4 38.1 MB
    icon 08 Step 5 Maintaining Access (...hold on tight)/028 Maintaining-Access.hold-on-tight.pdf 21.8 MB
    icon 08 Step 5 Maintaining Access (...hold on tight)/029 Lab (...spread out and grab on)-en.srt 27.2 KB
    icon 08 Step 5 Maintaining Access (...hold on tight)/029 Lab (...spread out and grab on).mp4 47.6 MB
    icon 09 Step 6 Covering Tracks and Placing Backdoors (...dig in deep)/030 Covering Tracks and Placing Backdoors (...dig in deep)-en.srt 21.2 KB
    icon 09 Step 6 Covering Tracks and Placing Backdoors (...dig in deep)/030 Covering Tracks and Placing Backdoors (...dig in deep).mp4 30.5 MB
    icon 09 Step 6 Covering Tracks and Placing Backdoors (...dig in deep)/030 Covering-Tracks-and-Placing-Backdoors.dig-in-deep.pdf 42.6 MB
    icon 09 Step 6 Covering Tracks and Placing Backdoors (...dig in deep)/031 Lab (...hide in case the lights turn on)-en.srt 14.4 KB
    icon 09 Step 6 Covering Tracks and Placing Backdoors (...dig in deep)/031 Lab (...hide in case the lights turn on).mp4 26.5 MB
    icon 10 Conclusion (...and what should I do next)/032 Conclusion (...scared yet)-en.srt 2.3 KB
    icon 10 Conclusion (...and what should I do next)/032 Conclusion (...scared yet).mp4 9 MB
    icon 10 Conclusion (...and what should I do next)/033 -UNOFFICIAL-Certified-Ethical-Hacker-CEH-Practice-Exams.txt 57 B
    icon 10 Conclusion (...and what should I do next)/033 Anatomy-of-a-Cyber-Attack-Beginner-Hacking-with-Metasploit.txt 64 B
    icon 10 Conclusion (...and what should I do next)/033 BONUS LECTURE Whats next (...deep discount on my Network course and more)-en.srt 1.6 KB
    icon 10 Conclusion (...and what should I do next)/033 BONUS LECTURE Whats next (...deep discount on my Network course and more).mp4 11.3 MB
    icon 10 Conclusion (...and what should I do next)/033 Bonus-Resources.pdf 19.9 KB
    icon 10 Conclusion (...and what should I do next)/033 CompTIA-CySA-CS0-001-5-Practice-Certification-Exams.txt 54 B
    icon 10 Conclusion (...and what should I do next)/033 CompTIA-CySA-CS0-001-Complete-Course-and-Practice-Exam.txt 58 B
    icon 10 Conclusion (...and what should I do next)/033 CompTIA-Network-Cert-N10-007-Full-Course-Practice-Exam.txt 55 B
    icon 10 Conclusion (...and what should I do next)/033 CompTIA-Network-N10-007-5-Practice-Exams-Simulations.txt 61 B
    icon 10 Conclusion (...and what should I do next)/033 CompTIA-Pentest-PT0-001-Complete-Course-Practice-Exam.txt 55 B
    icon 10 Conclusion (...and what should I do next)/033 CompTIA-Security-SY0-501-5-Practice-Exams-Simulations-.txt 75 B
    icon 10 Conclusion (...and what should I do next)/033 CompTIA-Security-SY0-501-Complete-Course-Practice-Exam.txt 56 B
    icon 10 Conclusion (...and what should I do next)/033 Connect-with-Jason-at-Dion-Training.txt 30 B
    icon 10 Conclusion (...and what should I do next)/033 How-to-Pass-Certification-Exams-with-Strategic-Test-Taking-.txt 58 B
    icon 10 Conclusion (...and what should I do next)/033 Introduction-to-Cloud-Security-with-Microsoft-Azure.txt 57 B
    icon 10 Conclusion (...and what should I do next)/033 Introduction-to-Malware-Analysis-for-Incident-Responders.txt 60 B
    icon Информация.pdf 86.9 KB

Similar Torrents