Регистрация ·  Логин: Пароль: Запомнить   · Забыли пароль?




Ответить на тему
Автор Сообщение

Модератор
Аватара пользователя

С нами: 11 лет 1 месяц
Сообщения: 87029
Откуда: Красноярск
СССР

Сообщение 18 янв 2016, 14:51 

[Цитировать]

Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing [Video]


Год выпуска: 2013
Производитель: Packtpub
Сайт производителя: https://www.packtpub.com/networking-and-servers/kal...on-testing-video
Автор: Justin Hutchens
Продолжительность: 02:43:47
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux.
About This Video

This course will offer a complete roadmap for the penetration testing process from start to finish.
Experience hands-on video demonstrations regarding how to use an extensive collection of tools within the Kali-Linux environment to perform penetration tests against every aspect of a target network.
Advanced techniques with detailed explanations that are useful to novice users and experienced viewers alike
Who This Video Is For

Kali Linux - Backtrack Evolved: A Penetration Tester’s Guide is a great choice for anybody interested in information security, penetration testing or ethical hacking. While a basic understanding of Linux and TCP/IP will be helpful in understanding the content, it is not essential.
Chapter 1: Lab Preparation
Developing a Network Environment
00:02:17
How to Install Oracle VirtualBox
00:03:02
How to Install VMware Player
00:03:07
How to Install Kali Linux
00:03:52
Increasing Network Attack Surface
00:03:51
Chapter 2: Information Gathering and Reconnaissance
Passive Reconnaissance
00:04:11
Google Hacking
00:04:26
Subdomain Enumeration with Google Hacking
00:03:40
Reconnaissance Tools (Dmitry & Goofile)
00:03:12
Network Enumeration with Maltego
00:03:31
Chapter 3: Target Discovery
Layer 2 Discovery
00:03:43
Layer 3 Discovery
00:05:22
Host Discovery with nmap
00:04:37
Network Discovery with Scapy
00:04:30
Fingerprinting Operating Systems
00:02:55
Chapter 4: Scanning and Enumeration
Scanning with nmap
00:03:23
Scanning with Zenmap
00:04:33
Nmap Scripting
00:04:53
Zombie Scanning
00:03:36
Service Identification
00:04:02
Chapter 5: Vulnerability Mapping
Metasploit Auxilliary Scans
00:03:13
Installing Nessus
00:04:40
Nessus Scanning
00:04:04
Nessus Policies
00:03:40
Nessus Result Analysis
00:03:55
Chapter 6: Exploitation with Metasploit
Metasploit Framework
00:04:45
Meterpreter Basics
00:04:15
Meterpreter - Advanced Exploitation
00:03:45
Installing Metasploit Pro
00:02:08
Exploitation with Metasploit Pro
00:04:56
Chapter 7: Hands-on Exploitation
Exploit Database
00:05:30
Social Engineering Toolkit - Credential Harvester
00:05:11
Burp Suite Intruder
00:05:22
Web Application Exploitation
00:06:02
Maintaining Access
00:05:26
Chapter 8: Privilege Escalation
Ettercap
00:04:11
Hash Identifier / Find-My-Hash
00:03:39
Hydra
00:03:58
John the Ripper
00:04:11
Johnny / xHydra
00:04:11
Файлы примеров: отсутствуют
Формат видео: MP4
Видео: AVC, 1280x720 (16:9), 30.000 fps, x264 core 120 ~451 Kbps avg, 0.016 bit/pixel
Аудио: 48.0 KHz, AAC LC, 2 ch, ~111 Kbps


















Download
Для скачивания .torrent файлов необходима регистрация
Сайт не распространяет и не хранит электронные версии произведений, а лишь предоставляет доступ к создаваемому пользователями каталогу ссылок на торрент-файлы, которые содержат только списки хеш-сумм

Страница 1 из 1

Ответить на тему

   Похожие торренты   Торрент