zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
[TutorialPace.com] Lynda - Learning Kali Linux - [TP]
magnet:?xt=urn:btih:0ab8751782e997d67d574ecb4939f53aaabe35a5&dn=[TutorialPace.com] Lynda - Learning Kali Linux - [TP]
磁力链接详情
文件列表详情
0ab8751782e997d67d574ecb4939f53aaabe35a5
infohash:
43
文件数量
476.18 MB
文件大小
2019-11-9 23:31
创建日期
2024-11-1 12:26
最后访问
相关分词
TutorialPace
com
Lynda
-
Learning
Kali
Linux
-
TP
1. Introduction/02. What you should know.mp4 1.1 MB
5. 4. Vulnerability Analysis/27. Review Vega_s menus.mp4 2.65 MB
5. 4. Vulnerability Analysis/18. Reviewing the tools.mp4 3.01 MB
8. Conclusion/43. Next steps.mp4 3.7 MB
5. 4. Vulnerability Analysis/22. Custom scan with OpenVAS.mp4 4.51 MB
4. 3. Information Gathering (Understanding the Target)/14. Reviewing the tools.mp4 4.53 MB
5. 4. Vulnerability Analysis/24. Install Vega.mp4 4.75 MB
5. 4. Vulnerability Analysis/19. Introducing Spike.mp4 5.42 MB
7. 6. Exploiting Targets/36. Overview of exploitation tools.mp4 6 MB
7. 6. Exploiting Targets/40. More exploiting with Armitage.mp4 6.43 MB
6. 5. Passwords and Hashes/32. Use John for Windows passwords.mp4 7.11 MB
6. 5. Passwords and Hashes/30. Windows Credential Editor.mp4 7.32 MB
7. 6. Exploiting Targets/39. Exploiting with Armitage.mp4 7.34 MB
3. 2. Introducing Kali/13. Update Kali.mp4 7.75 MB
6. 5. Passwords and Hashes/31. Use John the Ripper in Linux.mp4 7.93 MB
3. 2. Introducing Kali/11. Change screensaver and font settings.mp4 8.18 MB
4. 3. Information Gathering (Understanding the Target)/15. Introducing DMitry.mp4 8.55 MB
7. 6. Exploiting Targets/42. Getting stealth and persistent access.mp4 8.7 MB
2. 1. Setting Up the Virtual Lab/08. Working with advanced configuration in VirtualBox.mp4 8.73 MB
1. Introduction/01. Welcome.mp4 9.84 MB
3. 2. Introducing Kali/09. What is Kali.mp4 10.23 MB
5. 4. Vulnerability Analysis/25. Web crawling with Vega.mp4 10.61 MB
4. 3. Information Gathering (Understanding the Target)/16. Introducing DNSenum.mp4 10.75 MB
6. 5. Passwords and Hashes/34. Pass the hash.mp4 10.87 MB
6. 5. Passwords and Hashes/29. Use command-line tools.mp4 11.09 MB
6. 5. Passwords and Hashes/28. Password testing.mp4 11.38 MB
5. 4. Vulnerability Analysis/26. Use Vega as a web proxy.mp4 11.96 MB
5. 4. Vulnerability Analysis/20. Install OpenVAS.mp4 11.99 MB
6. 5. Passwords and Hashes/35. Use Rainbow Tables.mp4 12.75 MB
7. 6. Exploiting Targets/38. Creating Trojans with msfvenom.mp4 12.91 MB
6. 5. Passwords and Hashes/33. Explore Johnny_s options.mp4 13.45 MB
3. 2. Introducing Kali/12. Explore the applications in Kali.mp4 13.7 MB
5. 4. Vulnerability Analysis/23. Explore the OpenVAS menu.mp4 14.04 MB
2. 1. Setting Up the Virtual Lab/03. Introduction to virtualization.mp4 14.46 MB
2. 1. Setting Up the Virtual Lab/07. Getting Metasploitable and Windows VMs.mp4 16.65 MB
7. 6. Exploiting Targets/41. Pivot through a network.mp4 17.27 MB
2. 1. Setting Up the Virtual Lab/04. Setting up a virtual lab.mp4 18.74 MB
5. 4. Vulnerability Analysis/21. Run an OpenVAS scan.mp4 19.08 MB
2. 1. Setting Up the Virtual Lab/06. Installing appliances.mp4 21.25 MB
2. 1. Setting Up the Virtual Lab/05. Installing virtual machines.mp4 21.81 MB
4. 3. Information Gathering (Understanding the Target)/17. Introducing Maltego.mp4 22.2 MB
7. 6. Exploiting Targets/37. Exploit Linux with Metasploit.mp4 22.26 MB
3. 2. Introducing Kali/10. Explore the quick access list.mp4 23.19 MB
其他位置