zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Lynda - Introduction to Kali Linux
magnet:?xt=urn:btih:e57c75ddd82bf928c43b91d06536935343a963dc&dn=Lynda - Introduction to Kali Linux
磁力链接详情
文件列表详情
e57c75ddd82bf928c43b91d06536935343a963dc
infohash:
42
文件数量
463.88 MB
文件大小
2017-3-26 15:59
创建日期
2024-11-4 22:43
最后访问
相关分词
Lynda
-
Introduction
to
Kali
Linux
01. Introduction/01_01-Welcome.mp4 10.59 MB
01. Introduction/01_02-What you should know.mp4 1.1 MB
02. Setting Up the Virtual Lab/02_01-Introduction to virtualization.mp4 14.46 MB
02. Setting Up the Virtual Lab/02_02-Setting up a virtual lab.mp4 19.41 MB
02. Setting Up the Virtual Lab/02_03-Installing virtual machines.mp4 21.85 MB
02. Setting Up the Virtual Lab/02_04-Installing appliances.mp4 10.99 MB
02. Setting Up the Virtual Lab/02_05-Getting Metasploitable and Windows VMs.mp4 16.65 MB
02. Setting Up the Virtual Lab/02_06-Working with advanced configuration in VirtualBox.mp4 8.73 MB
03. Introducing Kali/03_01-What is Kali.mp4 10.23 MB
03. Introducing Kali/03_02-Explore the quick access list.mp4 23.19 MB
03. Introducing Kali/03_03-Change screensaver and font settings.mp4 8.18 MB
03. Introducing Kali/03_04-Explore the applications in Kali.mp4 13.7 MB
03. Introducing Kali/03_05-Update Kali.mp4 7.75 MB
04. Information Gathering Understanding the Target/04_01-Reviewing the tools.mp4 4.53 MB
04. Information Gathering Understanding the Target/04_02-Introducing DMitry.mp4 8.55 MB
04. Information Gathering Understanding the Target/04_03-Introducing DNSenum.mp4 10.75 MB
04. Information Gathering Understanding the Target/04_04-Introducing Maltego.mp4 22.2 MB
05. Vulnerability Analysis/05_01-Reviewing the tools.mp4 3.01 MB
05. Vulnerability Analysis/05_02-Introducing Spike.mp4 5.42 MB
05. Vulnerability Analysis/05_03-Install OpenVAS.mp4 11.99 MB
05. Vulnerability Analysis/05_04-Run an OpenVAS scan.mp4 19.08 MB
05. Vulnerability Analysis/05_05-Custom scan with OpenVAS.mp4 4.51 MB
05. Vulnerability Analysis/05_06-Explore the OpenVAS menu.mp4 14.04 MB
05. Vulnerability Analysis/05_07-Install Vega.mp4 4.75 MB
05. Vulnerability Analysis/05_08-Web crawling with Vega.mp4 10.61 MB
05. Vulnerability Analysis/05_09-Use Vega as a web proxy.mp4 11.96 MB
05. Vulnerability Analysis/05_10-Review Vegas menus.mp4 2.65 MB
06. Passwords and Hashes/06_01-Password testing.mp4 22.56 MB
06. Passwords and Hashes/06_02-Use commandline tools.mp4 11.09 MB
06. Passwords and Hashes/06_03-Windows Credential Editor.mp4 7.26 MB
06. Passwords and Hashes/06_04-Use John the Ripper in Linux.mp4 7.93 MB
06. Passwords and Hashes/06_05-Use John for Windows passwords.mp4 8.82 MB
06. Passwords and Hashes/06_06-Explore Johnnys options.mp4 13.45 MB
06. Passwords and Hashes/06_07-Pass the hash.mp4 8.86 MB
06. Passwords and Hashes/06_08-Use rainbow tables.mp4 12.82 MB
07. Exploiting Targets/07_01-Overview of exploitation tools.mp4 6 MB
07. Exploiting Targets/07_02-Exploit Linux with Metasploit.mp4 22.26 MB
07. Exploiting Targets/07_03-Exploit Windows with Armitage.mp4 15.21 MB
07. Exploiting Targets/07_04-More exploiting with Armitage.mp4 6.43 MB
07. Exploiting Targets/07_05-Pivot through a network.mp4 8.39 MB
07. Exploiting Targets/07_06-Install persistent access.mp4 8.23 MB
08. Conclusion/08_01-Next steps.mp4 3.7 MB
其他位置