PacktPub | Metasploit Unleashed: Build defense against complex attacks [Video] [FCO]

seeders: 28
leechers: 8
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 173
  • Language: English

Files

[FreeCoursesOnline.Me] PacktPub - Metasploit Unleashed - Build defense against complex attacks [Video] 0. Websites you may like
  • 0. (1Hack.Us) Premium Tutorials-Guides-Articles & Community based Forum.url (0.4 KB)
  • 1. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url (0.3 KB)
  • 2. (NulledPremium.com) Download E-Learning, E-Books, Audio-Books, & more.etc.url (0.2 KB)
  • 3. (FTUApps.com) Download Cracked Developers Applications For Free.url (0.2 KB)
  • How you can help our Group!.txt (0.2 KB)
  • 01.The Course Overview.en.dfxp (9.9 KB)
  • 01.The Course Overview.mp4 (38.9 MB)
  • 02.Organizing a Pentest with Metasploit.en.dfxp (16.9 KB)
  • 02.Organizing a Pentest with Metasploit.mp4 (55.9 MB)
  • 03.Introduction to Exploitation.en.dfxp (16.5 KB)
  • 03.Introduction to Exploitation.mp4 (36.0 MB)
  • 04.Metasploit Installation.en.dfxp (12.8 KB)
  • 04.Metasploit Installation.mp4 (43.7 MB)
  • 05.Metasploit Interfaces and Modules.en.dfxp (16.3 KB)
  • 05.Metasploit Interfaces and Modules.mp4 (14.6 MB)
  • 06.Metasploit Databases.en.dfxp (18.8 KB)
  • 06.Metasploit Databases.mp4 (19.2 MB)
  • 07.Metasploitable Setup.en.dfxp (17.7 KB)
  • 07.Metasploitable Setup.mp4 (35.6 MB)
  • 08.Scanning with Metasploit.en.dfxp (19.6 KB)
  • 08.Scanning with Metasploit.mp4 (29.0 MB)
  • 09.Nmap Integration for Advanced Scanning.en.dfxp (15.5 KB)
  • 09.Nmap Integration for Advanced Scanning.mp4 (21.9 MB)
  • 10.Nessus integration in to Metasploit.en.dfxp (16.4 KB)
  • 10.Nessus integration in to Metasploit.mp4 (16.7 MB)
  • 11.Scanning with Nessus.en.dfxp (23.8 KB)
  • 11.Scanning with Nessus.mp4 (36.5 MB)
  • 12.Nexpose Integration to Prioritize Vulnerabilities.en.dfxp (16.8 KB)
  • 12.Nexpose Integration to Prioritize Vulnerabilities.mp4 (28.6 MB)
  • 13.What Is Meterpreter.en.dfxp (15.8 KB)
  • 13.What Is Meterpreter.mp4 (40.0 MB)
  • 14.Working with Meterpreter.en.dfxp (15.6 KB)
  • 14.Working with Meterpreter.mp4 (36.6 MB)
  • 15.Meterpreter Scripting.en.dfxp (23.3 KB)
  • 15.Meterpreter Scripting.mp4 (40.1 MB)
  • 16.Working with Railgun.en.dfxp (22.2 KB)
  • 16.Working with Railgun.mp4 (30.7 MB)
  • 17.Custom Meterpreter Scripts.en.dfxp (28.4 KB)
  • 17.Custom Meterpreter Scripts.mp4 (41.9 MB)
  • 18.Types of Client-Side Exploits.en.dfxp (14.0 KB)
  • 18.Types of Client-Side Exploits.mp4 (13.6 MB)
  • 19.Browser Exploits to Breach Browser Security.en.dfxp (24.4 KB)
  • 19.Browser Exploits to Breach Browser Security.mp4 (54.2 MB)
  • 20.Exploit File Formats to Create Custom Files.en.dfxp (20.3 KB)
  • 20.Exploit File Formats to Create Custom Files.mp4 (60.1 MB)
  • 21.Standalone Attacks.en.dfxp (11.2 KB)
  • 21.Standalone Attacks.mp4 (30.0 MB)
  • 22.Delivering Exploits.en.dfxp (20.1 KB)
  • 22.Delivering Exploits.mp4 (37.7 MB)
  • 23.Server-Side Exploitation Types.en.dfxp (24.7 KB)
  • 23.Server-Side Exploitation Types.mp4 (58.8 MB)
  • 24.Exploiting Web Servers.en.dfxp (19.8 KB)
  • 24.Exploiting Web Servers.mp4 (53.6 MB)
  • 25.Exploit Database with Remote Exploits.en.dfxp (19.1 KB)
  • 25.Exploit Database with Remote Exploits.mp4 (48.8 MB)
  • 26.Exploiting VOIP.en.dfxp (21.5 KB)
  • 26.Exploiting VOIP.mp4 (38.0 MB)
  • 27.Exploiting SCADA Systems.en.dfxp (23.7 KB)
  • 27.Exploiting SCADA Systems.mp4 (39.2 MB)
  • 28.Privilege Escalation to Grant Access.en.dfxp (24.0 KB)
  • 28.Privilege Escalation to Grant Access.mp4 (54.9 MB)
  • 29.Gathering Passwords with Mimikatz and Kiwi.en.dfxp (22.9 KB)
  • 29.Gathering Passwords with Mimikatz and Kiwi.mp4 (58.0 MB)
  • 30.Post Exploitations.en.dfxp (14.8 KB)
  • 30.Post Exploitations.mp4 (42.5 MB)
  • 31.Maintaining Access.en.dfxp (20.0 KB)
  • 31.Maintaining Access.mp4 (37.0 MB)
  • 32.Covering Your Tracks.en.dfxp (20.7 KB)
  • 32.Covering Your Tracks.mp4 (39.8 MB)
  • 33.Social Engineering Toolkit (SET).en.dfxp (19.0 KB)
  • 33.Social Engineering Toolkit (SET).mp4 (28.0 MB)
  • 34.Using Armitage to Share Access.en.dfxp (28.4 KB)
  • 34.Using Armitage to Share Access.mp4 (35.8 MB)
  • 35.Turning on RDP.en.dfxp (18.8 KB)
  • 35.Turning on RDP.mp4 (26.0 MB)
  • 36.Screen Capture, Keylogging, and Webcam.en.dfxp (25.0 KB)
  • 36.Screen Capture, Keylogging, and Webcam.mp4 (35.6 MB)
  • 37.Manipulating the Registry.en.dfxp (22.3 KB)
  • 37.Manipulating the Registry.mp4 (42.1 MB)
  • 38.Evasion with MSFvenom.en.dfxp (20.1 KB)
  • 38.Evasion with MSFvenom.mp4 (36.2 MB)
  • 39.Evasion with Veil.en.dfxp (16.0 KB)
  • 39.Evasion with Veil.mp4 (30.2 MB)
  • 40.Evasion with Trojanizer.en.dfxp (10.1 KB)
  • 40.Evasion with Trojanizer.mp4 (11.2 MB)
  • 41.Evasion with Metasploit.en.dfxp (13.6 KB)
  • 41.Evasion with Metasploit.mp4 (80.3 MB)
  • 42.Creating Custom Modules.en.dfxp (17.5 KB)
  • 42.Creating Custom Modules.mp4 (81.6 MB)
  • 43.Implementing Custom Modules.en.dfxp (20.9 KB)
  • 43.Implementing Custom Modules.mp4 (95.8 MB)

Description

Lynda and other Courses >>> https://www.freecoursesonline.me/
For Developer Tools & Apps >>> https://kickasstorrents.to/
Forum for discussion >>> https://1hack.us/




By : Shane Hartman
Released : January 21, 2020 (New Release!)
Course Source : https://www.packtpub.com/security/metasploit-unleashed-build-defense-against-complex-attacks-video

Learn the Microservices overall Architecture, Building Blocks, Key Advantages, Challenges and Industry Case Studies

Video Details

ISBN 9781789618846
Course Length 5 hours 54 minutes

Learn

• Understand Metasploit and the Metasploit commands used in the command line interface
• Exploit commands: set to set variables and show to show the exploit options, targets, payloads, encoders, nops and the evasion options
• Meterpreter commands to get you started and help familiarize you with this most powerful tool
• Use of Metasploit as a vulnerability scanner leveraging tools such as NMap and Nessus
• Use Pivoting for routing traffic from a normally non-routable network
• Perform test services such as SCADA, and test in a highly secured environment
• Simulate attacks on web servers and systems with Armitage

About

Metasploit is a platform for testing, executing, and exploiting computer systems using a modular framework. It is used to create security testing tools and exploit modules and also as a penetration testing system. In this course, you will use a powerful VM called Metasploitable which is a vulnerable version of Linux for Metasploit. You will begin with setting up of the Metasploit architecture and get familiar with Meterpreter commands, and using these to launch payloads and interact with exploited systems. You will use Metasploit as a vulnerability scanner, leveraging tools such as NMap and Nessus and then work on real-world sophisticated scenarios in which performing penetration tests is a challenge. You will go on a journey through client-side and server-side attacks using Metasploit and various scripts built on the Metasploit framework. Then you will establish foothold on the network by staying hidden, and pivoting to other systems. Finally, you will carry out a cyber attack using Armitage, a GUI-based tool. By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. There is something for everyone from the beginner to experienced practitioner looking to broaden their knowledge. No prior knowledge of Metasploit is assumed.

Features:

• Gain the skills to carry out penetration testing in complex and highly-secured environments
• Get equipped with the Metasploit framework, exploit and generate modules for a variety of real-world scenarios
• Practical guide to understand and implement new useful methods and techniques to make your network robust and resilient

Author

Shane Hartman

Shane Hartman, Founder and Executive Director of SpecterLabs. With over 20 years of IT experience ranging from network engineering to enterprise security, His experience gives him a broad understanding security needs facing the IT industry today. He has a masters degree in digital forensics and currently teaches forensics, enterprise security, and offensive computing at the collegiate level. https://www.linkedin.com/in/shanehartman/





Download torrent
1.7 GB
seeders:28
leechers:8
PacktPub | Metasploit Unleashed: Build defense against complex attacks [Video] [FCO]


Trackers

tracker name
udp://open.demonii.si:1337/announce
udp://p4p.arenabg.com:1337/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.uw0.xyz:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://denis.stalker.upeer.me:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.me:2710/announce
udp://tracker.tiny-vps.com:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://open.stealth.si:80/announce
udp://tracker.iamhansen.xyz:2000/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.pirateparty.gr:6969/announce
udp://opentor.org:2710/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.zerobytes.xyz:1337/announce
https://tracker.opentracker.se:443/announce
https://tracker.nanoha.org:443/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker.nyaa.uk:6969/announce
udp://9.rarbg.com:2790/announce
http://tracker.ygsub.com:6969/announce
udp://9.rarbg.me:2730/announce
udp://9.rarbg.to:2790/announce
udp://open.nyap2p.com:6969/announce
udp://tracker-udp.gbitt.info:80/announce
http://t.nyaatracker.com:80/announce
http://tracker.files.fm:6969/announce
udp://tracker-udp.gbitt.info:80/announce
udp://9.rarbg.to:2710/announce
µTorrent compatible trackers list

Download torrent
1.7 GB
seeders:28
leechers:8
PacktPub | Metasploit Unleashed: Build defense against complex attacks [Video] [FCO]


Torrent hash: 8B25F934FA79F91E484DD9CB225E7FBD626B0B40