Общая информация
Название Practical Guide to Windows Pentesting with Kali Linux
Тип Приложение для PC
Размер 4.56Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 47б
1 321б
1. The Course Overview.mp4 45.83Мб
1. The Course Overview.mp4 21.10Мб
1. The Course Overview-en_US.srt 3.53Кб
1. The Course Overview-en_US.srt 3.03Кб
10 307.21Кб
10. Using Maltego.mp4 100.54Мб
10. Using Maltego-en_US.srt 11.27Кб
10. Using Public Exploits.mp4 186.27Мб
10. Using Public Exploits-en_US.srt 19.14Кб
11 403.56Кб
11. Exploiting with Metasploit.mp4 87.81Мб
11. Exploiting with Metasploit-en_US.srt 10.50Кб
11. Installing OpenVAS.mp4 29.45Мб
11. Installing OpenVAS-en_US.srt 4.60Кб
12 31.37Кб
12. Scanning with OpenVAS.mp4 42.78Мб
12. Scanning with OpenVAS-en_US.srt 5.60Кб
12. Social Engineering.mp4 132.45Мб
12. Social Engineering-en_US.srt 14.43Кб
13 358.12Кб
13. Evading Anti-Virus.mp4 288.78Мб
13. Evading Anti-Virus-en_US.srt 29.22Кб
13. Installing Nessus.mp4 72.08Мб
13. Installing Nessus-en_US.srt 8.82Кб
14 466.13Кб
14. Final Word on Exploitation.mp4 6.35Мб
14. Final Word on Exploitation-en_US.srt 2.49Кб
14. Scanning with Nessus.mp4 30.61Мб
14. Scanning with Nessus-en_US.srt 6.39Кб
15 728.25Кб
15. About Post-Exploitation.mp4 5.13Мб
15. About Post-Exploitation-en_US.srt 2.34Кб
15. Exploiting with Metasploit.mp4 29.92Мб
15. Exploiting with Metasploit-en_US.srt 5.50Кб
16 4.16Кб
16. Metasploit and MSFvenom.mp4 117.61Мб
16. Metasploit and MSFvenom-en_US.srt 9.81Кб
16. Meterpreter.mp4 107.97Мб
16. Meterpreter-en_US.srt 12.88Кб
17 973.47Кб
17. Privilege Escalation.mp4 125.70Мб
17. Privilege Escalation-en_US.srt 17.70Кб
17. Using Armitage.mp4 64.76Мб
17. Using Armitage-en_US.srt 7.83Кб
18 190.48Кб
18. Collecting Credentials.mp4 97.00Мб
18. Collecting Credentials-en_US.srt 14.38Кб
18. Other Ways to Exploit.mp4 99.29Мб
18. Other Ways to Exploit-en_US.srt 6.93Кб
19 257.64Кб
19. Password Brute-Force.mp4 80.45Мб
19. Password Brute-Force-en_US.srt 13.84Кб
19. What Is Yuki and How Do We Install It.mp4 71.92Мб
19. What Is Yuki and How Do We Install It-en_US.srt 7.73Кб
2 233.20Кб
2. Disclaimer.mp4 5.55Мб
2. Disclaimer-en_US.srt 2.09Кб
2. Pre-Installed Kali Linux.mp4 95.05Мб
2. Pre-Installed Kali Linux-en_US.srt 11.60Кб
20 383.38Кб
20. Achieving Persistence.mp4 397.94Мб
20. Achieving Persistence-en_US.srt 37.49Кб
20. Scanning with Yuki.mp4 55.40Мб
20. Scanning with Yuki-en_US.srt 4.66Кб
21 564.81Кб
21. Installing, Configuring, and Scanning with Sniper.mp4 59.67Мб
21. Installing, Configuring, and Scanning with Sniper-en_US.srt 6.91Кб
21. Pivoting.mp4 85.63Мб
21. Pivoting-en_US.srt 15.15Кб
22 473.99Кб
22. Pass-the-Hash Attack.mp4 200.10Мб
22. Pass-the-Hash Attack-en_US.srt 26.67Кб
22. Using Individual Tools.mp4 59.80Мб
22. Using Individual Tools-en_US.srt 6.92Кб
23 943.71Кб
23. Review And Next Steps.mp4 33.49Мб
23. Review And Next Steps-en_US.srt 2.20Кб
23. Understanding Cross-Site Scripting.mp4 12.62Мб
23. Understanding Cross-Site Scripting-en_US.srt 4.10Кб
24 85.87Кб
24. Implementing an XSS Attack.mp4 101.65Мб
24. Implementing an XSS Attack-en_US.srt 8.19Кб
25 708.91Кб
25. SQL Injection Theory.mp4 5.94Мб
25. SQL Injection Theory-en_US.srt 2.20Кб
26 248.43Кб
26. Implementing a SQL Attack.mp4 76.54Мб
26. Implementing a SQL Attack-en_US.srt 11.80Кб
27 692.27Кб
27. Cracking Passwords with John the Ripper.mp4 61.95Мб
27. Cracking Passwords with John the Ripper-en_US.srt 7.29Кб
28 54.11Кб
28. Cracking Passwords with Hydra.mp4 36.01Мб
28. Cracking Passwords with Hydra-en_US.srt 5.51Кб
29 385.22Кб
29. Checking AD Password Strengths of Users.mp4 86.75Мб
29. Checking AD Password Strengths of Users-en_US.srt 8.32Кб
3 184.13Кб
3. Installing Kali Linux from Scratch.mp4 35.08Мб
3. Installing Kali Linux from Scratch-en_US.srt 9.19Кб
3. Test Lab Architecture.mp4 5.73Мб
3. Test Lab Architecture-en_US.srt 2.65Кб
30 201.79Кб
30. Using Software to Bypass Local Passwords.mp4 27.45Мб
30. Using Software to Bypass Local Passwords-en_US.srt 5.27Кб
31 338.02Кб
31. Monitoring Resources.mp4 36.24Мб
31. Monitoring Resources-en_US.srt 5.58Кб
32 185.53Кб
32. Gathering Your Findings.mp4 30.70Мб
32. Gathering Your Findings-en_US.srt 6.17Кб
33 611.72Кб
33. Report Presentation.mp4 65.31Мб
33. Report Presentation-en_US.srt 10.74Кб
34 638.09Кб
35 321.33Кб
36 170.04Кб
37 227.93Кб
38 282.74Кб
39 777.28Кб
4 926.02Кб
4. Setting Up Kali.mp4 42.72Мб
4. Setting Up Kali-en_US.srt 4.41Кб
4. Updating, Downloading and Installing Apps.mp4 133.27Мб
4. Updating, Downloading and Installing Apps-en_US.srt 10.58Кб
40 1012.72Кб
41 942.76Кб
42 517.56Кб
43 303.06Кб
44 400.11Кб
45 84.50Кб
46 565.87Кб
47 564.27Кб
48 921.05Кб
49 393.32Кб
5 752.33Кб
5. Running Services on Kali.mp4 51.69Мб
5. Running Services on Kali-en_US.srt 4.58Кб
5. Setting Up Target Win 10.mp4 228.50Мб
5. Setting Up Target Win 10-en_US.srt 20.58Кб
50 511.50Кб
51 664.13Кб
52 61.33Кб
53 277.60Кб
54 463.27Кб
6 528.01Кб
6. Setting Up Target Win 2016.mp4 56.82Мб
6. Setting Up Target Win 2016-en_US.srt 5.80Кб
6. Understanding Different Types of Tools.mp4 6.50Мб
6. Understanding Different Types of Tools-en_US.srt 3.69Кб
7 145.97Кб
7. Creating the Domain.mp4 152.86Мб
7. Creating the Domain-en_US.srt 14.51Кб
7. Footprinting the Network.mp4 64.32Мб
7. Footprinting the Network-en_US.srt 10.15Кб
8 747.73Кб
8. Manipulating Google.mp4 61.62Мб
8. Manipulating Google-en_US.srt 8.90Кб
8. Scanning.mp4 204.82Мб
8. Scanning-en_US.srt 23.02Кб
9 560.19Кб
9. Scanning with NMAP and Zenmap.mp4 53.38Мб
9. Scanning with NMAP and Zenmap-en_US.srt 9.81Кб
9. Service Identification.mp4 172.48Мб
9. Service Identification-en_US.srt 22.42Кб
Pentesting-with-kali-linux.zip 207б
TutsNode.com.txt 63б
Статистика распространения по странам
Россия (RU) 2
Вьетнам (VN) 1
США (US) 1
Польша (PL) 1
Франция (FR) 1
Всего 6
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент