[Pluralsight.com] Penetration Testing and Ethical Hacking with Kali Linux [2015, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям
Торрент Сидеров Личеров Размер
torrent_5076225.torrent
0 0 815.31 МБ
Аватара пользователя
Солнышко
Сообщения: 22944
Зарегистрирован: 13 янв 2016, 22:10

[Pluralsight.com] Penetration Testing and Ethical Hacking with Kali Linux [2015, ENG]

Сообщение Солнышко » 26 фев 2017, 15:24

Penetration Testing and Ethical Hacking with Kali Linux

Год выпуска: 2015
Производитель: Pluralsight
Сайт производителя: pluralsight.com
Автор: Gus Khawaja
Продолжительность: 6:02
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: This course introduces ethical hackers and penetration testers to Kali Linux. This course will show IT professionals how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux.
Installing and Configuring Kali Linux
Introduction
Kali Linux 2.0
Creating a Virtual Machine
Installing Kali Linux
Updating Kali Linux
Installing Additional Tools on Kali
Configuring SSH
Being Anonymous with Tor
Scan Your System for Rootkits
Summary

Pre-penetration Testing Checklist
Introduction
Pre-penetration Checklist
Course Workflow
Summary

Information Gathering
Introduction
Gathering Information Checklist
Write Down Your Findings Using KeepNote
Visiting the Client Website
Google Hacking Database
Using Some Tools on the Web
Trying Metagoofile to Gather Documents Information
Gather Contacts Information
Whois
DNS Reconnaissance
Deep Magic Information Gathering Tool
Discover Scripts
Playing Around with Recon-ng
Summary

External Pen-testing
Introduction
External Penetration Testing Workflow
Traceroute
Host Discovery
Port Scanning
Summary

Website Penetration Testing
Introduction
Website Penetration Testing Workflow
Web Application Firewall Scan
Load Balancer Scan
Website Crawling
Burpsuite Proxy
Burpsuite Target
Burpsuite Spider
Burpsuite Discover Contents
Copy a Website
SSL Scanning
CMS Scanning
Scanning for Web Specific Vulnerabilities
Sessions Tokens Test
Exploiting the SQL Injection
Maintaining Access
Denial of Service Attack
Summary

Internal Network Penetration Testing
Introduction
Internal Penetration Testing Workflow
Port Scanning the Internal Network
Scanning for Vulnerabilities
Summary

Network Sniffing
Introduction
Network Monitoring
Sniffing with Wireshark
Detecting MITM
Detecting a SYN Scan
Understanding Brute Force Attack
Discovering a Denial of Service
Summary

Exploitation
Introduction
Exploiting Using Metasploit
Post Exploitation in Metasploit
Persistence
Using Meterpreter
Armitage
Summary

Social Engineering
Introduction
Social Engineering Toolkit
PowerShell Attack
Spear Phishing Attack
Credential Harvester
Summary

Wi-Fi Penetration Testing
Introduction
Wireless Reconnaissance
WEP Attack
WPA/WPA2 Attack
Bypassing a Hidden ESSID
Summary

Brute Force Attack Testing
Introduction
Brute Forcing SSH
Brute Forcing RDP
Brute Forcing WebForms Authentication
Cracking the Hashes
Summary

Advanced Penetration Testing
Introduction
Bypassing the Anti-virus
Metasploit Rc Scripts
Finding Exploits
Attacking the Domain Controller
Summary
Файлы примеров: присутствуют
Формат видео: MP4
Видео: AVC, 1024x768, 4:3, 15fps, 237kbps
Аудио: AAC, 44.1kHz, 118kbps, stereo
У вас нет необходимых прав для просмотра вложений в этом сообщении.