Pluralsight - Penetration Testing and Ethical Hacking with Kali Linux - TorrentBank

File Name:Pluralsight - Penetration Testing and Ethical Hacking with Kali Linux

Create Tool:Tixati v2.12

Create Time:2015-09-11 20:54:29

File Size:815.31 MB

File Count:97

File Hash:b0deb8e2100963ddd4ddb4f709602370fab25e14

Magnet Link:

Magnet Link:

Torrent File:

01. Installing and Configuring Kali Linux/01_01-Introduction.mp4 1.14 MB
01. Installing and Configuring Kali Linux/01_02-Kali Linux 2.0.mp4 30.85 MB
01. Installing and Configuring Kali Linux/01_03-Creating a Virtual Machine.mp4 30.47 MB
01. Installing and Configuring Kali Linux/01_04-Installing Kali Linux.mp4 16.47 MB
01. Installing and Configuring Kali Linux/01_05-Updating Kali Linux.mp4 13.17 MB
01. Installing and Configuring Kali Linux/01_06-Installing Additional Tools on Kali.mp4 10.19 MB
01. Installing and Configuring Kali Linux/01_07-Configuring SSH.mp4 2.30 MB
01. Installing and Configuring Kali Linux/01_08-Being Anonymous with Tor.mp4 6.54 MB
01. Installing and Configuring Kali Linux/01_09-Scan Your System for Rootkits.mp4 3.32 MB
01. Installing and Configuring Kali Linux/01_10-Summary.mp4 924.75 KB
02. Prepenetration Testing Checklist/02_01-Introduction.mp4 1.27 MB
02. Prepenetration Testing Checklist/02_02-Prepenetration Checklist.mp4 12.77 MB
02. Prepenetration Testing Checklist/02_03-Course Workflow.mp4 2.59 MB
02. Prepenetration Testing Checklist/02_04-Summary.mp4 545.07 KB
03. Information Gathering/03_01-Introduction.mp4 1.59 MB
03. Information Gathering/03_02-Gathering Information Checklist.mp4 6.70 MB
03. Information Gathering/03_03-Write Down Your Findings Using KeepNote.mp4 4.37 MB
03. Information Gathering/03_04-Visiting the Client Website.mp4 2.86 MB
03. Information Gathering/03_05-Google Hacking Database.mp4 12.43 MB
03. Information Gathering/03_06-Using Some Tools on the Web.mp4 6.21 MB
03. Information Gathering/03_07-Trying Metagoofile to Gather Documents Information.mp4 4.50 MB
03. Information Gathering/03_08-Gather Contacts Information.mp4 4.05 MB
03. Information Gathering/03_09-Whois.mp4 5.76 MB
03. Information Gathering/03_10-DNS Reconnaissance.mp4 3.59 MB
03. Information Gathering/03_11-Deep Magic Information Gathering Tool.mp4 7.30 MB
03. Information Gathering/03_12-Discover Scripts.mp4 11.59 MB
03. Information Gathering/03_13-Playing Around with Reconng.mp4 19.21 MB
03. Information Gathering/03_14-Summary.mp4 1.42 MB
04. External Pentesting/04_01-Introduction.mp4 1.21 MB
04. External Pentesting/04_02-External Penetration Testing Workflow.mp4 2.38 MB
04. External Pentesting/04_03-Traceroute.mp4 6.84 MB
04. External Pentesting/04_04-Host Discovery.mp4 5.13 MB
04. External Pentesting/04_05-Port Scanning.mp4 13.65 MB
04. External Pentesting/04_06-Summary.mp4 767.71 KB
05. Website Penetration Testing/05_01-Introduction.mp4 1.06 MB
05. Website Penetration Testing/05_02-Website Penetration Testing Workflow.mp4 2.59 MB
05. Website Penetration Testing/05_03-Web Application Firewall Scan.mp4 1.87 MB
05. Website Penetration Testing/05_04-Load Balancer Scan.mp4 2.03 MB
05. Website Penetration Testing/05_05-Website Crawling.mp4 1.89 MB
05. Website Penetration Testing/05_06-Burpsuite Proxy.mp4 11.44 MB
05. Website Penetration Testing/05_07-Burpsuite Target.mp4 6.90 MB
05. Website Penetration Testing/05_08-Burpsuite Spider.mp4 6.85 MB
05. Website Penetration Testing/05_09-Burpsuite Discover Contents.mp4 11.16 MB
05. Website Penetration Testing/05_10-Copy a Website.mp4 4.34 MB
05. Website Penetration Testing/05_11-SSL Scanning.mp4 6.41 MB
05. Website Penetration Testing/05_12-CMS Scanning.mp4 6.16 MB
05. Website Penetration Testing/05_13-Scanning for Web Specific Vulnerabilities.mp4 26.16 MB
05. Website Penetration Testing/05_14-Sessions Tokens Test.mp4 8.26 MB
05. Website Penetration Testing/05_15-Exploiting the SQL Injection.mp4 8.39 MB
05. Website Penetration Testing/05_16-Maintaining Access.mp4 6.52 MB
05. Website Penetration Testing/05_17-Denial of Service Attack.mp4 18.12 MB
05. Website Penetration Testing/05_18-Summary.mp4 2.17 MB
06. Internal Network Penetration Testing/06_01-Introduction.mp4 935.34 KB
06. Internal Network Penetration Testing/06_02-Internal Penetration Testing Workflow.mp4 959.57 KB
06. Internal Network Penetration Testing/06_03-Port Scanning the Internal Network.mp4 5.81 MB
06. Internal Network Penetration Testing/06_04-Scanning for Vulnerabilities.mp4 30.51 MB
06. Internal Network Penetration Testing/06_05-Summary.mp4 775.80 KB
07. Network Sniffing/07_01-Introduction.mp4 873.34 KB
07. Network Sniffing/07_02-Network Monitoring.mp4 8.65 MB
07. Network Sniffing/07_03-Sniffing with Wireshark.mp4 10.78 MB
07. Network Sniffing/07_04-Detecting MITM.mp4 23.66 MB
07. Network Sniffing/07_05-Detecting a SYN Scan.mp4 16.91 MB
07. Network Sniffing/07_06-Understanding Brute Force Attack.mp4 11.38 MB
07. Network Sniffing/07_07-Discovering a Denial of Service.mp4 15.74 MB
07. Network Sniffing/07_08-Summary.mp4 1.43 MB
08. Exploitation/08_01-Introduction.mp4 1.05 MB
08. Exploitation/08_02-Exploiting Using Metasploit.mp4 23.41 MB
08. Exploitation/08_03-Post Exploitation in Metasploit.mp4 20.63 MB
08. Exploitation/08_04-Persistence.mp4 7.03 MB
08. Exploitation/08_05-Using Meterpreter.mp4 27.30 MB
08. Exploitation/08_06-Armitage.mp4 14.90 MB
08. Exploitation/08_07-Summary.mp4 1.22 MB
09. Social Engineering/09_01-Introduction.mp4 797.66 KB
09. Social Engineering/09_02-Social Engineering Toolkit.mp4 16.18 MB
09. Social Engineering/09_03-PowerShell Attack.mp4 12.65 MB
09. Social Engineering/09_04-Spear Phishing Attack.mp4 14.13 MB
09. Social Engineering/09_05-Credential Harvester.mp4 9.39 MB
09. Social Engineering/09_06-Summary.mp4 1.05 MB
10. WiFi Penetration Testing/10_01-Introduction.mp4 1.98 MB
10. WiFi Penetration Testing/10_02-Wireless Reconnaissance.mp4 11.00 MB
10. WiFi Penetration Testing/10_03-WEP Attack.mp4 20.73 MB
10. WiFi Penetration Testing/10_04-WPAWPA2 Attack.mp4 23.55 MB
10. WiFi Penetration Testing/10_05-Bypassing a Hidden ESSID.mp4 5.89 MB
10. WiFi Penetration Testing/10_06-Summary.mp4 1.23 MB
11. Brute Force Attack Testing/11_01-Introduction.mp4 1.34 MB
11. Brute Force Attack Testing/11_02-Brute Forcing SSH.mp4 5.24 MB
11. Brute Force Attack Testing/11_03-Brute Forcing RDP.mp4 3.59 MB
11. Brute Force Attack Testing/11_04-Brute Forcing WebForms Authentication.mp4 8.79 MB
11. Brute Force Attack Testing/11_05-Cracking the Hashes.mp4 7.15 MB
11. Brute Force Attack Testing/11_06-Summary.mp4 959.12 KB
12. Advanced Penetration Testing/12_01-Introduction.mp4 760.94 KB
12. Advanced Penetration Testing/12_02-Bypassing the Antivirus.mp4 18.82 MB
12. Advanced Penetration Testing/12_03-Metasploit Rc Scripts.mp4 6.93 MB
12. Advanced Penetration Testing/12_04-Finding Exploits.mp4 12.22 MB
12. Advanced Penetration Testing/12_05-Attacking the Domain Controller.mp4 16.26 MB
12. Advanced Penetration Testing/12_06-Summary.mp4 1.04 MB
Exercise files/kalilinuxpenetrationtestingethicalhacking.zip 3.46 MB
udp://open.demonii.com:1337/announce
udp://tracker.publicbt.com:80/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker.istole.it:80/announce

TorrentBank
Copyright © 2024