[ DevCourseWeb.com ] Udemy - The Ultimate Guide For Network Penetration Testing
大小
1.13 GB
文件数
28
Info Hash:
BC15416297DE49FBD6C5EFDEDAE370CF01708F2E
收录时间
2026-01-08 15:25:57
更新时间
2026-01-08 15:25:57
文件列表 (28)
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1. Introduction to Network Penetration Testing/1. Introduction.mp4
22.65 MB
~Get Your Files Here !/1. Introduction to Network Penetration Testing/2. Types Of Network Security.mp4
27.71 MB
~Get Your Files Here !/2. The Lab Setup/1. Setting Up Virtualbox and Network Interface.mp4
69.32 MB
~Get Your Files Here !/2. The Lab Setup/2. Setting up kali linux [ Download ].mp4
59.17 MB
~Get Your Files Here !/2. The Lab Setup/3. Setting up kali linux [ Install ].mp4
25.81 MB
~Get Your Files Here !/2. The Lab Setup/4. Downlaod and Install Metasploitable 2.mp4
43.86 MB
~Get Your Files Here !/2. The Lab Setup/5. Downlaod and Install Metasploitable 3.mp4
132.02 MB
~Get Your Files Here !/2. The Lab Setup/6. Prepare A Vulnerable Web Application.mp4
34.35 MB
~Get Your Files Here !/2. The Lab Setup/7. Configuring A Vulnerable Wireless.mp4
7.65 MB
~Get Your Files Here !/2. The Lab Setup/8. QUIZ.html
161 B
~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/1. Let's Start by Ennumeration.mp4
55.73 MB
~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/2. Discovering The NMAP TOOL.mp4
86.41 MB
~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/3. NESSUS - Setting up & Demonstration.mp4
106.47 MB
~Get Your Files Here !/3. Network Scanning and Enumeration Techniques/4. QUIZ.html
161 B
~Get Your Files Here !/4. Popular EXPLOITS/1. Let's Evade Security.mp4
123.7 MB
~Get Your Files Here !/4. Popular EXPLOITS/2. Let's Exploit Systems.mp4
46.06 MB
~Get Your Files Here !/4. Popular EXPLOITS/3. Let's Exploit Systems Part II.mp4
82.07 MB
~Get Your Files Here !/4. Popular EXPLOITS/4. QUIZ.html
161 B
~Get Your Files Here !/5. Understanding Web Application Attacks/1. The Combination of FOXYPROXY + BurpSUITE.mp4
86.99 MB
~Get Your Files Here !/5. Understanding Web Application Attacks/2. The SQL INJECTIONS Methods.mp4
52.18 MB
~Get Your Files Here !/5. Understanding Web Application Attacks/3. QUIZ.html
161 B
~Get Your Files Here !/6. Understanding Wireless Attacks/1. WEP EXPLAINED.mp4
12.38 MB
~Get Your Files Here !/6. Understanding Wireless Attacks/2. WEP PENETRATION METHODS.mp4
7.88 MB
~Get Your Files Here !/6. Understanding Wireless Attacks/3. WAP WAP2 EXPLAINED.mp4
13.56 MB
~Get Your Files Here !/6. Understanding Wireless Attacks/4. WAP WAP2 PENETRATION TECHNIQUES.mp4
14.04 MB
~Get Your Files Here !/7. Conclusion and Best Practices/1. What to do next .mp4
45.02 MB
~Get Your Files Here !/Bonus Resources.txt
386 B