资源详情

返回首页 | 相关搜索
Lynda Learning Kali Linux
大小 476.39 MB
文件数 86
Info Hash: 29C2F739D0B62471A5C70820A6F03780E2735B8D
收录时间 2026-01-01 04:49:43
更新时间 2026-01-01 04:49:43
文件列表 (86)
3. 2. Introducing Kali/10. Explore the quick access list.mp4
23.19 MB
1. Introduction/01. Welcome.mp4
9.84 MB
1. Introduction/02. What you should know.en.srt
830 B
1. Introduction/02. What you should know.mp4
1.1 MB
2. 1. Setting Up the Virtual Lab/03. Introduction to virtualization.en.srt
8.79 KB
2. 1. Setting Up the Virtual Lab/03. Introduction to virtualization.mp4
14.46 MB
2. 1. Setting Up the Virtual Lab/04. Setting up a virtual lab.en.srt
12.08 KB
2. 1. Setting Up the Virtual Lab/04. Setting up a virtual lab.mp4
18.74 MB
2. 1. Setting Up the Virtual Lab/05. Installing virtual machines.en.srt
12.25 KB
2. 1. Setting Up the Virtual Lab/05. Installing virtual machines.mp4
21.81 MB
2. 1. Setting Up the Virtual Lab/06. Installing appliances.en.srt
9.09 KB
2. 1. Setting Up the Virtual Lab/06. Installing appliances.mp4
21.25 MB
2. 1. Setting Up the Virtual Lab/07. Getting Metasploitable and Windows VMs.en.srt
7.4 KB
2. 1. Setting Up the Virtual Lab/07. Getting Metasploitable and Windows VMs.mp4
16.65 MB
2. 1. Setting Up the Virtual Lab/08. Working with advanced configuration in VirtualBox.en.srt
5.11 KB
2. 1. Setting Up the Virtual Lab/08. Working with advanced configuration in VirtualBox.mp4
8.73 MB
3. 2. Introducing Kali/09. What is Kali.en.srt
3.79 KB
3. 2. Introducing Kali/09. What is Kali.mp4
10.23 MB
3. 2. Introducing Kali/10. Explore the quick access list.en.srt
9.92 KB
1. Introduction/01. Welcome.en.srt
2.39 KB
3. 2. Introducing Kali/11. Change screensaver and font settings.en.srt
2.76 KB
3. 2. Introducing Kali/11. Change screensaver and font settings.mp4
8.18 MB
3. 2. Introducing Kali/12. Explore the applications in Kali.en.srt
6.01 KB
3. 2. Introducing Kali/12. Explore the applications in Kali.mp4
13.7 MB
3. 2. Introducing Kali/13. Update Kali.en.srt
2.3 KB
3. 2. Introducing Kali/13. Update Kali.mp4
7.75 MB
4. 3. Information Gathering (Understanding the Target)/14. Reviewing the tools.en.srt
1.82 KB
4. 3. Information Gathering (Understanding the Target)/14. Reviewing the tools.mp4
4.53 MB
4. 3. Information Gathering (Understanding the Target)/15. Introducing DMitry.en.srt
3.39 KB
4. 3. Information Gathering (Understanding the Target)/15. Introducing DMitry.mp4
8.55 MB
4. 3. Information Gathering (Understanding the Target)/16. Introducing DNSenum.en.srt
4.21 KB
4. 3. Information Gathering (Understanding the Target)/16. Introducing DNSenum.mp4
10.75 MB
4. 3. Information Gathering (Understanding the Target)/17. Introducing Maltego.en.srt
10.8 KB
4. 3. Information Gathering (Understanding the Target)/17. Introducing Maltego.mp4
22.2 MB
5. 4. Vulnerability Analysis/18. Reviewing the tools.en.srt
1.26 KB
5. 4. Vulnerability Analysis/18. Reviewing the tools.mp4
3.01 MB
5. 4. Vulnerability Analysis/19. Introducing Spike.en.srt
1.59 KB
5. 4. Vulnerability Analysis/19. Introducing Spike.mp4
5.42 MB
5. 4. Vulnerability Analysis/20. Install OpenVAS.en.srt
3.57 KB
5. 4. Vulnerability Analysis/20. Install OpenVAS.mp4
11.99 MB
5. 4. Vulnerability Analysis/21. Run an OpenVAS scan.en.srt
9.68 KB
5. 4. Vulnerability Analysis/21. Run an OpenVAS scan.mp4
19.08 MB
5. 4. Vulnerability Analysis/22. Custom scan with OpenVAS.en.srt
1.99 KB
5. 4. Vulnerability Analysis/22. Custom scan with OpenVAS.mp4
4.51 MB
5. 4. Vulnerability Analysis/23. Explore the OpenVAS menu.en.srt
7.86 KB
5. 4. Vulnerability Analysis/23. Explore the OpenVAS menu.mp4
14.04 MB
5. 4. Vulnerability Analysis/24. Install Vega.en.srt
1.44 KB
5. 4. Vulnerability Analysis/24. Install Vega.mp4
4.75 MB
5. 4. Vulnerability Analysis/25. Web crawling with Vega.en.srt
5.76 KB
5. 4. Vulnerability Analysis/25. Web crawling with Vega.mp4
10.61 MB
5. 4. Vulnerability Analysis/26. Use Vega as a web proxy.en.srt
6.93 KB
5. 4. Vulnerability Analysis/26. Use Vega as a web proxy.mp4
11.96 MB
5. 4. Vulnerability Analysis/27. Review Vega's menus.en.srt
1.05 KB
5. 4. Vulnerability Analysis/27. Review Vega's menus.mp4
2.65 MB
6. 5. Passwords and Hashes/28. Password testing.en.srt
5.31 KB
6. 5. Passwords and Hashes/28. Password testing.mp4
11.38 MB
6. 5. Passwords and Hashes/29. Use command-line tools.en.srt
4.72 KB
6. 5. Passwords and Hashes/29. Use command-line tools.mp4
11.09 MB
6. 5. Passwords and Hashes/30. Windows Credential Editor.en.srt
4.4 KB
6. 5. Passwords and Hashes/30. Windows Credential Editor.mp4
7.32 MB
6. 5. Passwords and Hashes/31. Use John the Ripper in Linux.en.srt
2.75 KB
6. 5. Passwords and Hashes/31. Use John the Ripper in Linux.mp4
7.93 MB
6. 5. Passwords and Hashes/32. Use John for Windows passwords.en.srt
2.94 KB
6. 5. Passwords and Hashes/32. Use John for Windows passwords.mp4
7.11 MB
6. 5. Passwords and Hashes/33. Explore Johnny's options.en.srt
6.99 KB
6. 5. Passwords and Hashes/33. Explore Johnny's options.mp4
13.45 MB
6. 5. Passwords and Hashes/34. Pass the hash.en.srt
5.67 KB
6. 5. Passwords and Hashes/34. Pass the hash.mp4
10.87 MB
6. 5. Passwords and Hashes/35. Use Rainbow Tables.en.srt
4.71 KB
6. 5. Passwords and Hashes/35. Use Rainbow Tables.mp4
12.75 MB
7. 6. Exploiting Targets/36. Overview of exploitation tools.en.srt
2.77 KB
7. 6. Exploiting Targets/36. Overview of exploitation tools.mp4
6 MB
7. 6. Exploiting Targets/37. Exploit Linux with Metasploit.en.srt
8 KB
7. 6. Exploiting Targets/37. Exploit Linux with Metasploit.mp4
22.26 MB
7. 6. Exploiting Targets/38. Creating Trojans with msfvenom.en.srt
5.43 KB
7. 6. Exploiting Targets/38. Creating Trojans with msfvenom.mp4
12.91 MB
7. 6. Exploiting Targets/39. Exploiting with Armitage.en.srt
4.58 KB
7. 6. Exploiting Targets/39. Exploiting with Armitage.mp4
7.34 MB
7. 6. Exploiting Targets/40. More exploiting with Armitage.en.srt
3.91 KB
7. 6. Exploiting Targets/40. More exploiting with Armitage.mp4
6.43 MB
7. 6. Exploiting Targets/41. Pivot through a network.en.srt
7.13 KB
7. 6. Exploiting Targets/41. Pivot through a network.mp4
17.27 MB
7. 6. Exploiting Targets/42. Getting stealth and persistent access.en.srt
5.01 KB
7. 6. Exploiting Targets/42. Getting stealth and persistent access.mp4
8.7 MB
8. Conclusion/43. Next steps.en.srt
1.69 KB
8. Conclusion/43. Next steps.mp4
3.7 MB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。