[TutorialPace] Lynda - Learning Kali Linux - [TP]

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size476.4 MB
  • Uploaded ByTutorialPace
  • Downloads172
  • Last checkedMay. 31st '19
  • Date uploadedMay. 30th '19
  • Seeders 1
  • Leechers82

Infohash : 0AB8751782E997D67D574ECB4939F53AAABE35A5

Kali Linux is a flavor of Linux targeted at digital forensics experts and penetration (pen) testers. It includes over 400 pen-testing programs, and it is the primary tool used by ethical hackers. Using Kali Linux, certified ethical hackers can test networks on their organizations' behalves, to see if they're vulnerable to outside attacks.

Learning Kali Linux

https://tutorialpace.com/Learning-Kali-Linux

Files:

[TutorialPace.com] Lynda - Learning Kali Linux - [TP] 1. Introduction
  • 02. What you should know.en.srt (0.8 KB)
  • 01. Welcome.en.srt (2.4 KB)
  • 02. What you should know.mp4 (1.1 MB)
  • 01. Welcome.mp4 (9.8 MB)
5. 4. Vulnerability Analysis
  • 27. Review Vega_s menus.en.srt (1.0 KB)
  • 18. Reviewing the tools.en.srt (1.3 KB)
  • 24. Install Vega.en.srt (1.4 KB)
  • 19. Introducing Spike.en.srt (1.6 KB)
  • 22. Custom scan with OpenVAS.en.srt (2.0 KB)
  • 20. Install OpenVAS.en.srt (3.6 KB)
  • 25. Web crawling with Vega.en.srt (5.8 KB)
  • 26. Use Vega as a web proxy.en.srt (6.9 KB)
  • 23. Explore the OpenVAS menu.en.srt (7.9 KB)
  • 21. Run an OpenVAS scan.en.srt (9.7 KB)
  • 27. Review Vega_s menus.mp4 (2.6 MB)
  • 18. Reviewing the tools.mp4 (3.0 MB)
  • 22. Custom scan with OpenVAS.mp4 (4.5 MB)
  • 24. Install Vega.mp4 (4.7 MB)
  • 19. Introducing Spike.mp4 (5.4 MB)
  • 25. Web crawling with Vega.mp4 (10.6 MB)
  • 26. Use Vega as a web proxy.mp4 (12.0 MB)
  • 20. Install OpenVAS.mp4 (12.0 MB)
  • 23. Explore the OpenVAS menu.mp4 (14.0 MB)
  • 21. Run an OpenVAS scan.mp4 (19.1 MB)
8. Conclusion
  • 43. Next steps.en.srt (1.7 KB)
  • 43. Next steps.mp4 (3.7 MB)
4. 3. Information Gathering (Understanding the Target)
  • 14. Reviewing the tools.en.srt (1.8 KB)
  • 15. Introducing DMitry.en.srt (3.4 KB)
  • 16. Introducing DNSenum.en.srt (4.2 KB)
  • 17. Introducing Maltego.en.srt (10.8 KB)
  • 14. Reviewing the tools.mp4 (4.5 MB)
  • 15. Introducing DMitry.mp4 (8.6 MB)
  • 16. Introducing DNSenum.mp4 (10.8 MB)
  • 17. Introducing Maltego.mp4 (22.2 MB)
3. 2. Introducing Kali
  • 13. Update Kali.en.srt (2.3 KB)
  • 11. Change screensaver and font settings.en.srt (2.8 KB)
  • 09. What is Kali.en.srt (3.8 KB)
  • 12. Explore the applications in Kali.en.srt (6.0 KB)
  • 10. Explore the quick access list.en.srt (9.9 KB)
  • 13. Update Kali.mp4 (7.7 MB)
  • 11. Change screensaver and font settings.mp4 (8.2 MB)
  • 09. What is Kali.mp4 (10.2 MB)
  • 12. Explore the applications in Kali.mp4 (13.7 MB)
  • 10. Explore the quick access list.mp4 (23.2 MB)
6. 5. Passwords and Hashes
  • 31. Use John the Ripper in Linux.en.srt (2.8 KB)
  • 32. Use John for Windows passwords.en.srt (2.9 KB)
  • 30. Windows Credential Editor.en.srt (4.4 KB)
  • 35. Use Rainbow Tables.en.srt (4.7 KB)
  • 29. Use command-line tools.en.srt (4.7 KB)
  • 28. Password testing.en.srt (5.3 KB)
  • 34. Pass the hash.en.srt (5.7 KB)
  • 33. Explore Johnny_s options.en.srt (7.0 KB)
  • 32. Use John for Windows passwords.mp4 (7.1 MB)
  • 30. Windows Credential Editor.mp4 (7.3 MB)
  • 31. Use John the Ripper in Linux.mp4 (7.9 MB)
  • 34. Pass the hash.mp4 (10.9 MB)
  • 29. Use command-line tools.mp4 (11.1 MB)
  • 28. Password testing.mp4 (11.4 MB)
  • 35. Use Rainbow Tables.mp4 (12.8 MB)
  • 33. Explore Johnny_s options.mp4 (13.4 MB)
7. 6. Exploiting Targets
  • 36. Overview of exploitation tools.en.srt (2.8 KB)
  • 40. More exploiting with Armitage.en.srt (3.9 KB)
  • 39. Exploiting with Armitage.en.srt (4.6 KB)
  • 42. Getting stealth and persistent access.en.srt (5.0 KB)
  • 38. Creating Trojans with msfvenom.en.srt (5.4 KB)
  • 41. Pivot through a network.en.srt (7.1 KB)
  • 37. Exploit Linux with Metasploit.en.srt (8.0 KB)
  • 36. Overview of exploitation tools.mp4 (6.0 MB)
  • 40. More exploiting with Armitage.mp4 (6.4 MB)
  • 39. Exploiting with Armitage.mp4 (7.3 MB)
  • 42. Getting stealth and persistent access.mp4 (8.7 MB)
  • 38. Creating Trojans with msfvenom.mp4 (12.9 MB)
  • 41. Pivot through a network.mp4 (17.3 MB)
  • 37. Exploit Linux with Metasploit.mp4 (22.3 MB)
2. 1. Setting Up the Virtual Lab
  • 08. Working with advanced configuration in VirtualBox.en.srt (5.1 KB)
  • 07. Getting Metasploitable and Windows VMs.en.srt (7.4 KB)
  • 03. Introduction to virtualization.en.srt (8.8 KB)
  • 06. Installing appliances.en.srt (9.1 KB)
  • 04. Setting up a virtual lab.en.srt (12.1 KB)
  • 05. Installing virtual machines.en.srt (12.3 KB)
  • 08. Working with advanced configuration in VirtualBox.mp4 (8.7 MB)
  • 03. Introduction to virtualization.mp4 (14.5 MB)
  • 07. Getting Metasploitable and Windows VMs.mp4 (16.7 MB)
  • 04. Setting up a virtual lab.mp4 (18.7 MB)
  • 06. Installing appliances.mp4 (21.3 MB)
  • 05. Installing virtual machines.mp4 (21.8 MB)

Code:

  • http://open.trackerlist.xyz:80/announce
  • http://t.nyaatracker.com:80/announce
  • http://tracker.corpscorp.online:80/announce
  • https://opentracker.xyz:443/announce
  • https://t.quic.ws:443/announce
  • https://tracker.fastdownload.xyz:443/announce
  • udp://chihaya.toss.li:9696/announce
  • udp://denis.stalker.upeer.me:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.demonii.si:1337/announce
  • udp://open.stealth.si:80/announce
  • udp://tracker.iamhansen.xyz:2000/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://tracker.torrent.eu.org:451/announce
  • udp://9.rarbg.me:2710/announce
  • udp://tracker.leechers-paradise.org:6969/announce