Udemy - Ethical Hacking - A Hands-On Approach to Ethical Hacking

seeders: 15
leechers: 34
updated:
Added by CourseClub in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...

Files

[DesireCourse.Com] Udemy - Ethical Hacking - A Hands-On Approach to Ethical Hacking 1. Virtual Network Lab Build
  • 1. Start here!.mp4 (35.5 MB)
  • 1. Start here!.vtt (11.0 KB)
  • 2. Video and lab - Creating a Virtual install of Kali Using VMWare.mp4 (17.6 MB)
  • 2. Video and lab - Creating a Virtual install of Kali Using VMWare.vtt (10.3 KB)
  • 2.1 Lab - Creating a Virtual install of Kali using VMWare.html (0.2 KB)
  • 3. Video and lab - Creating a Virtual install of Kali using VirtualBox.mp4 (35.2 MB)
  • 3. Video and lab - Creating a Virtual install of Kali using VirtualBox.vtt (18.6 KB)
  • 3.1 Lab -Creating a Virtual Install of Kali Using VirtualBox.html (0.2 KB)
  • 4. Video and Lab - Installing VirtualBox Guest Additions in Kali.mp4 (125.1 MB)
  • 4. Video and Lab - Installing VirtualBox Guest Additions in Kali.vtt (8.3 KB)
  • 4.1 Lab - Installing VirtualBox Guest Additions in Kali.html (0.2 KB)
  • 5. Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare.mp4 (22.9 MB)
  • 5. Video and Lab - Creating an Unattended Virtual Install of XP Using VMWare.vtt (16.0 KB)
  • 5.1 Lab - Creating an Unattended Virtual Install of XP Using VMWare.html (0.2 KB)
  • 6. Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox.mp4 (24.8 MB)
  • 6. Video and lab - Creating an Unattended Virtual Install of XP Using Virtualbox.vtt (8.9 KB)
  • 6.1 Lab - Creating an Unattended Virtual Install of Windows XP Using VirtualBox.html (0.2 KB)
  • 7. Video - Troubleshooting Connectivity Issues With Virtualization.mp4 (31.2 MB)
  • 7. Video - Troubleshooting Connectivity Issues With Virtualization.vtt (9.5 KB)
10. Social Engineering
  • 1. Video and Lab - Using the Social Engineering Toolkit (SET).mp4 (24.8 MB)
  • 1. Video and Lab - Using the Social Engineering Toolkit (SET).vtt (7.9 KB)
  • 1.1 Lab - Harvesting Credentials Using the SET Tool Kit.html (0.2 KB)
11. BASH Scripting for Pentesters
  • 1. Video and Lab - Introduction to BASH Scripting.mp4 (211.3 MB)
  • 1. Video and Lab - Introduction to BASH Scripting.vtt (17.8 KB)
  • 1.1 Lab - Introduction to BASH Scripting.html (0.2 KB)
  • 2. Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports.mp4 (240.1 MB)
  • 2. Video and Lab - Creating a BASH Script for Scanning Vulnerable Ports.vtt (17.4 KB)
  • 2.1 Lab - Creating a BASH Script for Scanning Vulnerable Ports.html (0.2 KB)
  • 3. Lab -Linux BASH Shell Scripting -Task Scheduling.html (0.2 KB)
  • 3.1 Lab - Linux BASH Shell Scripting – Task Scheduling.html (0.2 KB)
12. Password Cracking
  • 1. Video and Lab – Password Cracking Using Medusa.mp4 (11.7 MB)
  • 1. Video and Lab – Password Cracking Using Medusa.vtt (6.4 KB)
  • 1.1 Lab - Password Cracking Using Medusa.html (0.2 KB)
  • 2. Video and Lab - Passwords Cracking Using Mimikatz.mp4 (37.9 MB)
  • 2. Video and Lab - Passwords Cracking Using Mimikatz.vtt (12.2 KB)
  • 2.1 Lab - Cracking Passwords Using Mimikatz.html (0.2 KB)
13. Web Based Application Attacks
  • 1. Video and Lab - Installing w3af in Kali Linux Using Docker.mp4 (211.1 MB)
  • 1. Video and Lab - Installing w3af in Kali Linux Using Docker.vtt (14.4 KB)
  • 1.1 Lab - Installing w3af in Kali Linux.html (0.2 KB)
  • 2. Video and Lab – Conducting A Website Vulnerability Scan Using w3af.mp4 (17.4 MB)
  • 2. Video and Lab – Conducting A Website Vulnerability Scan Using w3af.vtt (6.1 KB)
  • 2.1 Lab – Conducting A Website Vulnerability Scan Using w3af.html (0.2 KB)
  • 3. Video and Lab – Performing a Browser Based Attack.mp4 (36.0 MB)
  • 3. Video and Lab – Performing a Browser Based Attack.vtt (12.9 KB)
  • 3.1 Lab -Performing a Browser Based Attack.html (0.2 KB)
  • 4. Video and lab - SQL Injection Attack Using SQLmap.mp4 (37.2 MB)
  • 4. Video and lab - SQL Injection Attack Using SQLmap.vtt (14.1 KB)
  • 4.1 Lab - SQL Injection Attack Using SQLmap.html (0.2 KB)
14. Browser Exploitation Framework (BeEF)
  • 1. Video and Lab - Configure Kali for Exploitating the WAN.mp4 (188.9 MB)
  • 1. Video and Lab - Configure Kali for Exploitating the WAN.vtt (185.2 MB)
  • 2. Video and lab - The Browser Exploitation Framework (BeEF).mp4 (245.3 MB)
  • 2. Video and lab - The Browser Exploitation Framework (BeEF).vtt (22.0 KB)
  • 2.1 Lab - Browser Exploitation Framework (BeEF) - Client-Side Attacks.html (0.2 KB)
15. Capture the Flag Walkthrough - Mr. Robot
  • 1. Lab file - Capture the Flag (CTF) – Mr. Robot.html (0.2 KB)
  • 2. Video Walk Through -Key #1.mp4 (218.3 MB)
  • 2. Video Walk Through -Key #1.vtt (15.1 KB)
  • 3. Video Walk through - Key #2.mp4 (269.2 MB)
  • 3. Video Walk through - Key #2.vtt (22.2 KB)
  • 4. Video Walk Through - Key #3.mp4 (138.2 MB)
  • 4. Video Walk Through - Key #3.vtt (7.8 KB)
16. Capture the Flag Walkthrough – Stapler
  • 1. Lab File - Walkthrough - CTF – Stapler.html (0.2 KB)
  • 2. Video - Capture the Flag - Stapler Part 1.mp4 (290.8 MB)
  • 2. Video - Capture the Flag - Stapler Part 1.vtt (21.0 KB)
  • 3. Video - Capture the Flag - Stapler Part 2.mp4 (205.4 MB)
  • 3. Video - Capture the Flag - Stapler Part 2.vtt (19.7 KB)
  • 4. Video - Capture the Flag - Stapler Part 3.mp4 (180.7 MB)
  • 4. Video - Capture the Flag - Stapler Part 3.vtt (13.9 KB)
17. Bonus - Digital Forensics Case Management
  • 1. Video - Attaching an External USB Divice in Kali.mp4 (106.7 MB)
  • 1. Video - Attaching an External USB Divice in Kali.vtt (7.7 KB)
  • 2. Video and Lab -Digital Forensics Using Autopsy Part I.mp4 (134.9 MB)
  • 2. Video and Lab -Digital Forensics Using Autopsy Part I.vtt (12.1 KB)
  • 2.1 Lab - Digital Forensics Using Autopsy Part I.html (0.2 KB)
  • 3. Video and Lab - Digital Forensics Using Autopsy Part II.mp4 (97.6 MB)
  • 3. Video and Lab - Digital Forensics Using Autopsy Part II.vtt (8.3 KB)
  • 3.1 Lab - Digital Forensics Using Kali Part II.html (0.2 KB)
  • 4. Subscribe to my Tech blog!.html (0.2 KB)
  • 4.1 Subscribe to my tech blog! Nothing to buy, just a valid email address is all you need!.html (0.1 KB)
2. Optimizing Kali
  • 1. Video and lab - Install Kali Linux Tools Using Katoolin.mp4 (19.0 MB)
  • 1. Video and lab - Install Kali Linux Tools Using Katoolin.vtt (6.5 KB)
  • 1.1 Lab - Install Kali Li

Description

Ethical Hacking - A Hands-On Approach to Ethical Hacking

Ethical Hacking - A Complete Hands-On Training on Offensive Ethical Hacking and Penetration Testing Using Kali Linux

For More Courses Visit: https://desirecourse.com



Download torrent
5.7 GB
seeders:15
leechers:34
Udemy - Ethical Hacking - A Hands-On Approach to Ethical Hacking


Trackers

tracker name
udp://62.138.0.158:6969/announce
udp://87.233.192.220:6969/announce
udp://88.198.231.1:1337/announce
udp://151.80.120.113:2710/announce
udp://111.6.78.96:6969/announce
udp://90.179.64.91:1337/announce
udp://51.15.4.13:1337/announce
udp://191.96.249.23:6969/announce
udp://35.187.36.248:1337/announce
udp://123.249.16.65:2710/announce
udp://127.0.0.1:6969/announce
udp://210.244.71.25:6969/announce
udp://78.142.19.42:1337/announce
udp://173.254.219.72:6969/announce
udp://51.15.76.199:6969/announce
udp://91.212.150.191:3418/announce
udp://103.224.212.222:6969/announce
udp://92.241.171.245:6969/announce
udp://51.15.40.114:80/announce
udp://37.19.5.139:6969/announce
µTorrent compatible trackers list

Download torrent
5.7 GB
seeders:15
leechers:34
Udemy - Ethical Hacking - A Hands-On Approach to Ethical Hacking


Torrent hash: 66BAAC155192423CD11B7421E03E9F60883F39DE