Сообщение

[Pluralsight.com] Penetration Testing and Ethical Hacking with Kali Linux [2015, ENG]

Сообщение Солнышко » 26 фев 2017, 15:24

Penetration Testing and Ethical Hacking with Kali Linux

Год выпуска: 2015
Производитель: Pluralsight
Сайт производителя: pluralsight.com
Автор: Gus Khawaja
Продолжительность: 6:02
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: This course introduces ethical hackers and penetration testers to Kali Linux. This course will show IT professionals how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux.
Installing and Configuring Kali Linux
Introduction
Kali Linux 2.0
Creating a Virtual Machine
Installing Kali Linux
Updating Kali Linux
Installing Additional Tools on Kali
Configuring SSH
Being Anonymous with Tor
Scan Your System for Rootkits
Summary

Pre-penetration Testing Checklist
Introduction
Pre-penetration Checklist
Course Workflow
Summary

Information Gathering
Introduction
Gathering Information Checklist
Write Down Your Findings Using KeepNote
Visiting the Client Website
Google Hacking Database
Using Some Tools on the Web
Trying Metagoofile to Gather Documents Information
Gather Contacts Information
Whois
DNS Reconnaissance
Deep Magic Information Gathering Tool
Discover Scripts
Playing Around with Recon-ng
Summary

External Pen-testing
Introduction
External Penetration Testing Workflow
Traceroute
Host Discovery
Port Scanning
Summary

Website Penetration Testing
Introduction
Website Penetration Testing Workflow
Web Application Firewall Scan
Load Balancer Scan
Website Crawling
Burpsuite Proxy
Burpsuite Target
Burpsuite Spider
Burpsuite Discover Contents
Copy a Website
SSL Scanning
CMS Scanning
Scanning for Web Specific Vulnerabilities
Sessions Tokens Test
Exploiting the SQL Injection
Maintaining Access
Denial of Service Attack
Summary

Internal Network Penetration Testing
Introduction
Internal Penetration Testing Workflow
Port Scanning the Internal Network
Scanning for Vulnerabilities
Summary

Network Sniffing
Introduction
Network Monitoring
Sniffing with Wireshark
Detecting MITM
Detecting a SYN Scan
Understanding Brute Force Attack
Discovering a Denial of Service
Summary

Exploitation
Introduction
Exploiting Using Metasploit
Post Exploitation in Metasploit
Persistence
Using Meterpreter
Armitage
Summary

Social Engineering
Introduction
Social Engineering Toolkit
PowerShell Attack
Spear Phishing Attack
Credential Harvester
Summary

Wi-Fi Penetration Testing
Introduction
Wireless Reconnaissance
WEP Attack
WPA/WPA2 Attack
Bypassing a Hidden ESSID
Summary

Brute Force Attack Testing
Introduction
Brute Forcing SSH
Brute Forcing RDP
Brute Forcing WebForms Authentication
Cracking the Hashes
Summary

Advanced Penetration Testing
Introduction
Bypassing the Anti-virus
Metasploit Rc Scripts
Finding Exploits
Attacking the Domain Controller
Summary
Файлы примеров: присутствуют
Формат видео: MP4
Видео: AVC, 1024x768, 4:3, 15fps, 237kbps
Аудио: AAC, 44.1kHz, 118kbps, stereo

Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 15:24
Размер: 815.31 МБ
Размер: 854 909 692 байт
Сидеров: 0
Личеров: 0
Скачали: 1
Здоровье: 0%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: Нет
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 40.96 КБ / Просмотров 4 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность