TorBT - Torrents and Magnet Links Search Engine
Kali Linux for Advanced Pen Testing and Ethical Hacking
- Date: 2024-10-11
- Size: 416 MB
- Files: 47
File Name
Size
Ex_Files_Kali_Linux_2024.zip
29 kB
scholastic-linkedin.learning.kali.linux.for.advanced.pen.testing.and.ethical.hacking.bookware.nfo
296 B
1. Introduction/1. Using Kali Linux as the basis for advanced penetration testing.mp4
4.5 MB
1. Introduction/2. What you should know.mp4
1.4 MB
1. Introduction/3. Disclaimer.mp4
1.8 MB
2. Kali Basics/1. Testing with Kali Linux.mp4
8.1 MB
2. Kali Basics/2. Understanding Kali deployments.mp4
6.9 MB
2. Kali Basics/3. Preparing your toolbox.mp4
13 MB
2. Kali Basics/4. Preparing to use exploits for testing.mp4
20 MB
2. Kali Basics/5. Managing the Kali menu.mp4
12 MB
2. Kali Basics/6. Using the LinkedIn Learning penetration testing lab.mp4
7.1 MB
3. System Shells/1. Introduction to shells.mp4
6.0 MB
3. System Shells/2. Exploring Kali webshells.mp4
16 MB
3. System Shells/3. Weeving a shell.mp4
11 MB
3. System Shells/4. Generating shellcode with msfvenom.mp4
22 MB
3. System Shells/5. Injecting images with jhead.mp4
8.8 MB
3. System Shells/6. Using shellcode in exploits.mp4
8.8 MB
4. Exploiting Targets from Kali/1. Exploiting systems with Kali.mp4
1.1 MB
4. Exploiting Targets from Kali/2. Exploiting with Python.mp4
8.3 MB
4. Exploiting Targets from Kali/3. Exploiting with Perl.mp4
4.5 MB
4. Exploiting Targets from Kali/4. Exploiting with C.mp4
4.3 MB
4. Exploiting Targets from Kali/5. Exploiting with CPP.mp4
8.0 MB
5. Passwords/1. Obtaining Windows passwords.mp4
21 MB
5. Passwords/2. Obtaining Linux passwords.mp4
7.2 MB
6. Exploiting the Metasploitable Server/1. Targeting Metasploitable.mp4
1.6 MB
6. Exploiting the Metasploitable Server/2. Exploiting VSFTPD.mp4
7.6 MB
6. Exploiting the Metasploitable Server/3. Exploiting with ProFTPD.mp4
15 MB
6. Exploiting the Metasploitable Server/4. Exploiting Tomcat.mp4
8.1 MB
6. Exploiting the Metasploitable Server/5. Exploiting IRC.mp4
3.7 MB
6. Exploiting the Metasploitable Server/6. Exploiting the distributed compile system.mp4
3.6 MB
6. Exploiting the Metasploitable Server/7. Exploiting network files.mp4
6.8 MB
6. Exploiting the Metasploitable Server/8. Hiding in plain sight.mp4
1.4 MB
6. Exploiting the Metasploitable Server/9. Escalating to root.mp4
17 MB
7. End-to-End Testing/1. Starting with online labs.mp4
16 MB
7. End-to-End Testing/2. Exploiting rejetto.mp4
17 MB
7. End-to-End Testing/3. Exploiting the Devel.mp4
24 MB
7. End-to-End Testing/4. Time to exploit Cronos.mp4
13 MB
7. End-to-End Testing/5. Cronos revisited- Getting to the root.mp4
14 MB
7. End-to-End Testing/6. Using a nightmare escalator.mp4
8.8 MB
8. Crafting Exploit Scripts/1. Introducing kali-autopilot.mp4
8.4 MB
8. Crafting Exploit Scripts/2. Scripting a juicy attack.mp4
11 MB
8. Crafting Exploit Scripts/3. Attacking the juice shop.mp4
5.8 MB
8. Crafting Exploit Scripts/4. Hiving into Windows.mp4
9.8 MB
8. Crafting Exploit Scripts/5. Attacking the hives.mp4
5.7 MB
9. Command and Control with Sliver/1. Install Sliver server.mp4
6.2 MB
9. Command and Control with Sliver/2. Implement a Sliver agent.mp4
8.0 MB
10. Conclusion/1. Next steps.mp4
3.1 MB