Search Torrents

Udemy - Learn Penetration Testing using Android Fr...


Udemy - Learn Penetration Testing using Android From Scratch_Sin Torrent content (File list)
01 Introduction/001 Course Overview.mp4 79.9 MB
02 Weaponizing/001 Installing NetHunter Installer Drivers.html 3.4 KB
02 Weaponizing/001 Preparing Your Android Device.mp4 12.6 MB
02 Weaponizing/002 NetHunter Preview and my lab.mp4 13.2 MB
02 Weaponizing/002 Unlocking the device.html 3.1 KB
02 Weaponizing/003 Installing NetHunter and Rooting.html 4.0 KB
03 Installing Kali Linux As Virtual Machine Optional/001 Intro About Kali Linux Installation Options.mp4 18.4 MB
03 Installing Kali Linux As Virtual Machine Optional/002 Installing Kali Linux using iso Image.mp4 18.6 MB
03 Installing Kali Linux As Virtual Machine Optional/003 Final Setup.mp4 14.5 MB
04 Information Gathering/001 Discovering Wireless Networks - Wardriving.mp4 20.8 MB
04 Information Gathering/002 Preparing Your Device To Pentest WiFi Keys - WEPWPAWPA2.mp4 36.6 MB
04 Information Gathering/003 Basic Network Mapping - Using Wifi Analyzer.mp4 7.5 MB
04 Information Gathering/004 Basic Network Mapping Using Zanti2.mp4 35.5 MB
04 Information Gathering/005 Advanced Network Mapping Using Zanti2 Nmap.mp4 23.5 MB
05 Spying/001 Spying Intro.mp4 21.1 MB
05 Spying/002 MITM Man In The Middle Methods.mp4 25.1 MB
05 Spying/003 MITM Method 1 - Bad USB Attack.mp4 27.6 MB
05 Spying/004 MITM BadUSB Attack - Sniffing Data.mp4 37.5 MB
05 Spying/005 MITM BadUSB Attack - Bypassing HTTPS.mp4 34.5 MB
05 Spying/006 MITM BadUSB Attack - DNS Spoofing.mp4 16.7 MB
05 Spying/007 MITM Method 2 - ARP Poisoning.mp4 16.5 MB
05 Spying/008 ARP Poisoning using arpspoof.mp4 25.4 MB
05 Spying/009 ARP Poisoning Using Zanti2.mp4 26.9 MB
05 Spying/010 ARP Poisoning - Intercepting Downloaded Files.mp4 17.9 MB
05 Spying/011 ARP Poisoning - other attacks.mp4 8.5 MB
05 Spying/012 MITM Method 3 - Using a Honeypot.mp4 22.0 MB
05 Spying/013 Configuring Mana-Toolkit to Create a Honeypot.mp4 35.5 MB
05 Spying/014 Launching Mana.mp4 28.2 MB
05 Spying/015 Storing Data from the Honeypot.mp4 30.4 MB
06 Exploitation/001 Exploitation Introduction.mp4 17.1 MB
06 Exploitation/002 Bypassing WindowsOSX Logins - Setup.mp4 17.2 MB
06 Exploitation/003 Bypassing WindowsOSX Logins.mp4 142.8 MB
06 Exploitation/004 HID Keyboard Attack- simple windows command.mp4 30.8 MB
06 Exploitation/005 HID Keyboard Attack - Powersploit option.mp4 1.5 MB
06 Exploitation/006 Using Metasploit Meterpreter.mp4 40.7 MB
06 Exploitation/007 Using Veil Evasion.mp4 28.6 MB
06 Exploitation/008 Rubber Ducky Scripts.mp4 22.7 MB
06 Exploitation/009 Rubber Ducky Scripts - Download Execute.mp4 31.2 MB
06 Exploitation/010 Ducky Scripts - OSX Shell.mp4 29.1 MB
06 Exploitation/011 Ducky Linux Shell.mp4 16.0 MB
06 Exploitation/012 Replace Downloadeds With Files.mp4 28.5 MB
06 Exploitation/013 Backdoor Downloads On The Fly Using BDFproxy.mp4 64.7 MB
07 Detection Protection/001 Detecting ARP Poisoning Attacks.mp4 19.0 MB
07 Detection Protection/002 Detecting Suspicious Activity in the Network Solutions to ARP Poisoning.mp4 20.7 MB



  • Torrent indexed: 9 years

  • Torrent updated: Wednesday 29th of June 2016 04:00:02 PM
  • Torrent hash: 23050B134BB16FAEF23CE76AA8CE2E0F1FA410CD

  • Torrent size: 1.1 GB

  • Torrent category: other




Comments



Report suspicious or fake torrent



Community - Add torrent to search results - Stats - DMCA - Removal Request - TOR - Contact
BTC: 13uHKcvKFUuJvkmX2XbDuxFHueDoqaeBSi