Сообщение

[Udemy] Metasploit Extreme on Kali Linux [2014, ENG]

Сообщение Солнышко » 26 фев 2017, 15:41

Metasploit Extreme on Kali Linux

Год выпуска: 2014
Производитель: Udemy
Сайт производителя: https://www.udemy.com/draft/93016/
Автор: Mr. Hitesh Choudhary
Продолжительность: 5:46:28
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: Работа с фреймворком Kali Linux
Metaspoit Framework is a open source penetration tool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world's largest database of public, tested exploits. In simple words, Metasploit can be used to test the Vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems.

Its a powerful tool used for penetration testing.

In clear and short words, If you interested in words like security, Hacking, exploits etc, then this is a must series for you.
SECTION 1 WELCOME TO THE METASPLOIT SERIES
SECTION 2 RUSHING TO METASPLOIT
SECTION 3 INTRODUCTION TO METASPLOIT IN KALI LINUX
SECTION 4 CLEARING THE FUNDAMENTALS
SECTION 5 INFORMATION GATHERING VIA METASPLOIT
SECTION 6 VULNERABILITY SCANNING VIA METASPLOI
SECTION 7 EXPLOIT-PAYLOAD CREATION
SECTION 8 CLIENT SIDE ATTACKS
SECTION 9 AFTER EXPLOITATION STUFF
SECTION 10 SCRIPTS,METERPRETER AND RUBY EXTENSION
SECTION 11 BACKDOORING THE REMOTE SYSTEM
SECTION 12 REAL WORLD EXPLOITATION
SECTION 13 OUTRO OF THE SERIES

./SECTION 1 WELCOME TO THE METASPLOIT SERIES:
Lecture 1 - Intro to the Series.MP4
Lecture 2 - About the Instructor ( That's me ).MP4
Lecture 3 - How to take most out of the series!.MP4

./SECTION 2 RUSHING TO METASPLOIT:
Lecture 4 - What is Pentesting and why.MP4
Lecture 5 - Hats Off to HD.MP4
Lecture 6 - Terminologies and requirement of Metasploit.MP4
Lecture 7 - Kali Linux Installation.MP4
Lecture 8 - Installation of Pratice Lab.MP4
Lecture 9 - Getting Hurry with practicles.MP4

./SECTION 3 INTRODUCTION TO METASPLOIT IN KALI LINUX:
Lecture 10 - Metasploit Architecture.MP4
Lecture 11 - Mixins and Plugins with a touch to Ruby.MP4

./SECTION 4 CLEARING THE FUNDAMENTALS:
Lecture 12 - MsfCLI.MP4
Lecture 13 - Msfconsole.MP4
Lecture 14 - Exploits in Metasploit.MP4
Lecture 15 - Important commands for exploits usage.MP4
Lecture 16 - Payload Basics.MP4
Lecture 17 - Generating different Payloads.MP4
Lecture 18 - Database in Metasploit.MP4
Lecture 19 - Meterpreter in Metasploit.MP4
Lecture 20 - Meterpreter usage in metasploit.MP4

./SECTION 5 INFORMATION GATHERING VIA METASPLOIT:
Lecture 21 - Port Scanning with Metasploit.MP4
Lecture 22 - target mssql.MP4
Lecture 23 - Service information via metasploit.MP4
Lecture 24 - SNMP sniffing.MP4
Lecture 25 - psnuffel script in metasploit.MP4
Lecture 26 - custom scanner by user.MP4

./SECTION 6 VULNERABILITY SCANNING VIA METASPLOI:
Lecture 27 - SMB Login Check Scanner.MP4
Lecture 28 - open VNC server scanning.MP4
Lecture 29 - WMAP web scanner in metasploit.MP4
Lecture 30 - NeXpose scanner via metasploit.MP4
Lecture 31 - nessus usage and metasploit.MP4

./SECTION 7 EXPLOIT-PAYLOAD CREATION:
Lecture 32 - Design Goals for an Exploit.MP4
Lecture 33 - mixins in exploit writing.MP4
Lecture 34 - Msfvenom.MP4
Lecture 35 - Msfpayload.MP4
Lecture 36 - Msfencode.MP4
Lecture 37 - AN Shellcode.MP4

./SECTION 8 CLIENT SIDE ATTACKS:
Lecture 38 - Binary Payloads.MP4
Lecture 39 - Trojans for linux via Metasploit.MP4
Lecture 40 - malicious PDF file via Metasploit.MP4

./SECTION 9 AFTER EXPLOITATION STUFF:
Lecture 41 - Privilege Escalation.MP4
Lecture 42 - pass the hash attack.MP4
Lecture 43 - Session stealing attacks.MP4
Lecture 44 - Registry and backdoors in metsploit.MP4
Lecture 45 - packet sniffing with metasploit.MP4
Lecture 46 - Bypassing the forensic investigation.MP4
Lecture 47 - monitoring and searching the victim.MP4

./SECTION 10 SCRIPTS,METERPRETER AND RUBY EXTENSION:
Lecture 48 - Ready to use meterpreter scripts.MP4
Lecture 49 - automation of meterpreter via rc scripts.MP4
Lecture 50 - irb shell programming in meterpreter.MP4

./SECTION 11 BACKDOORING THE REMOTE SYSTEM:
Lecture 51 - keylogging the remote system.MP4
Lecture 52 - metsvc exploitation.MP4
Lecture 53 - persistence exploitation services.MP4

./SECTION 12 REAL WORLD EXPLOITATION:
Lecture 54 - Karmetasploit Breaking into a external system with windows 7.MP4

./SECTION 13 OUTRO OF THE SERIES:
Lecture 55 - Outro video.MP4
Файлы примеров: не предусмотрены
Видео: AVC, 642x360, 16:9, 30.000 fps, 104Kbps
Аудио: AAC, 44.1 KHz, 56.4 Kbps, 2 channels




Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 15:41
Размер: 498.72 МБ
Размер: 522 948 417 байт
Сидеров: 33
Личеров: 15
Скачали: 1
Здоровье: 100%
Раздающих: 100%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: 2 месяца 27 дней 10 часов 34 минуты 46 секунд назад
Последний личер: 2 месяца 27 дней 10 часов 34 минуты 46 секунд назад
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 45.53 КБ / Просмотров 3 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность