Udemy - Penetration Testing with KALI and More: All You Need to Know [FreeAllCourse]

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size4.4 GB
  • Uploaded ByLMorningStar
  • Downloads225
  • Last checkedMay. 31st '20
  • Date uploadedMay. 29th '20
  • Seeders 17
  • Leechers12

Infohash : 397AD158BC66755040104A3947E0E2D733D2C71C

Penetration Testing with KALI and More: All You Need to Know



Ethical Hacking with KALI LINUX

For More Paid Udemy Courses: FreeAllCourse.Com

What you'll learn?

# Learn simplified ethical hacking techniques from scratch
# Learn Linux basics
# Learn more than 9 ways to perform LAN attacks
# Master 2 smart techniques to crack into wireless networks
# Perform an actual Mobile attack
# Learn 10+ web application attacks
# Learn more than 5 proven methods of Social Engineering attacks
# Obtain 20+ skills any penetration tester needs to succeed
# Make better decisions on how to protect your applications and network
# Upgrade your information security skills for a new job or career change
# Learn how to write a professional penetration testing report

Description

Created by Mohamad Mahjoub
Last updated 5/2020
Audio : English
Caption: English [Auto-generated]


Files:

[FreeAllCourse.Com] Udemy - Penetration Testing with KALI and More All You Need to Know 0. Websites you may like
  • [FreeAllCourse.Com].url (0.1 KB)
1. Introduction
  • 1. The Undeniable Power of Ethical Hacking.mp4 (11.6 MB)
  • 1. The Undeniable Power of Ethical Hacking.srt (3.2 KB)
10. Proven Social Engineering Techniques
  • 1. Attack Vectors.mp4 (14.7 MB)
  • 1. Attack Vectors.srt (5.1 KB)
  • 2. Open-source Intelligence (OSINT).mp4 (6.7 MB)
  • 2. Open-source Intelligence (OSINT).srt (1.8 KB)
  • 3. Google Dorks Live Examples.mp4 (60.1 MB)
  • 3. Google Dorks Live Examples.srt (7.6 KB)
  • 3.1 Sample Google Dorks.txt (0.3 KB)
  • 3.2 Exploit Database.html (0.1 KB)
  • 4. Track and Spoof Emails Easily.mp4 (37.6 MB)
  • 4. Track and Spoof Emails Easily.srt (4.5 KB)
  • 5. Collect and Visualize Data with Maltego.mp4 (68.5 MB)
  • 5. Collect and Visualize Data with Maltego.srt (6.3 KB)
  • 6. Execute a Phishing Attack.mp4 (72.0 MB)
  • 6. Execute a Phishing Attack.srt (5.7 KB)
  • 7. Hack Facebook, Twitter, and Gmail Accounts.mp4 (88.5 MB)
  • 7. Hack Facebook, Twitter, and Gmail Accounts.srt (7.2 KB)
11. Attack Mobile Phones
  • 1. Mobile Attack Surface.mp4 (14.4 MB)
  • 1. Mobile Attack Surface.srt (5.1 KB)
  • 2. Decrypt SSL Session.mp4 (91.2 MB)
  • 2. Decrypt SSL Session.srt (14.2 KB)
  • 3. Reverse Engineer an Android Application.mp4 (78.8 MB)
  • 3. Reverse Engineer an Android Application.srt (7.4 KB)
  • 3.1 ProGuard.html (0.1 KB)
  • 4. Hack an Android Phone and Download its Contacts.mp4 (74.4 MB)
  • 4. Hack an Android Phone and Download its Contacts.srt (7.3 KB)
12. Maintain Access
  • 1. Post-Exploitation Terminologies.mp4 (13.2 MB)
  • 1. Post-Exploitation Terminologies.srt (5.0 KB)
  • 2. Backdoor Tools Explained.mp4 (15.0 MB)
  • 2. Backdoor Tools Explained.srt (4.8 KB)
  • 3. Netcat Simplified.mp4 (97.7 MB)
  • 3. Netcat Simplified.srt (12.6 KB)
  • 3.1 Netcat Download Source 2.html (0.1 KB)
  • 3.2 Netcat Download Source 1.html (0.1 KB)
  • 4. Install a Backdoor.mp4 (95.1 MB)
  • 4. Install a Backdoor.srt (6.3 KB)
  • 5. Deface a Website in Few Seconds.mp4 (54.6 MB)
  • 5. Deface a Website in Few Seconds.srt (5.4 KB)
  • 6. Create a Simple Ransomware.mp4 (33.5 MB)
  • 6. Create a Simple Ransomware.srt (3.5 KB)
  • 7. Understand Hidden Tear Ransomware.mp4 (109.9 MB)
  • 7. Understand Hidden Tear Ransomware.srt (109.9 MB)
  • 7.1 Hidden Tear Source Code.html (0.1 KB)
  • 8. Bypass Firewalls by Tunneling Data and Commands over DNS.mp4 (69.5 MB)
  • 8. Bypass Firewalls by Tunneling Data and Commands over DNS.srt (6.5 KB)
13. Let’s Get Real
  • 1. Publish Your Weapons Online.mp4 (31.3 MB)
  • 1. Publish Your Weapons Online.srt (3.8 KB)
  • 1.1 Setup DNSCAT.txt (0.2 KB)
  • 2. Stay Anonymous Online.mp4 (41.9 MB)
  • 2. Stay Anonymous Online.srt (28.0 MB)
  • 2.1 NO IP.html (0.1 KB)
  • 3. Setup a Stealthy Command and Control Center Online.mp4 (51.2 MB)
  • 3. Setup a Stealthy Command and Control Center Online.srt (6.1 KB)
14. How to Prepare and Present Your Report
  • 1. Report Writing Techniques.mp4 (87.5 MB)
  • 1. Report Writing Techniques.srt (15.1 KB)
  • 2. How Can Pentest.ws Help You.mp4 (71.0 MB)
  • 2. How Can Pentest.ws Help You.srt (71.0 MB)
  • 2.1 Pentest.ws.html (0.1 KB)
15. Secret Sauce BONUS
  • 1. Create a WiFi Jammer.mp4 (127.4 MB)
  • 1. Create a WiFi Jammer.srt (11.9 KB)
  • 2. Create a $3 Rubber Ducky Key-logger.mp4 (113.1 MB)
  • 2. Create a $3 Rubber Ducky Key-logger.srt (11.3 KB)
  • 2.1 Extra Resource List 3.html (0.1 KB)
  • 2.2 Extra Resource List 2.html (0.1 KB)
  • 2.3 Extra Resource List 5.html (0.1 KB)
  • 2.4 Extra Resource List 1.html (0.1 KB)
  • 2.5 Extra Resource List 7.html (0.1 KB)
  • 2.6 Extra Resource List 4.html (0.1 KB)
  • 2.7 Extra Resource List 6.html (0.1 KB)
  • 2.8 Course File Resources.html (0.1 KB)
  • 2.9 Extra Resource List 8.html (0.1 KB)
2. Setup Your Lab
  • 1. Why KALI.mp4 (7.6 MB)
  • 1. Why KALI.srt (2.2 KB)
  • 2. Different Installation Methods.mp4 (4.3 MB)
  • 2. Different Installation Methods.srt (0.9 KB)
  • 3. Install KALI.mp4 (31.7 MB)
  • 3. Install KALI.srt (5.4 KB)
  • 3.1 username_update.txt (0.6 KB)
  • 4. Color Coding for Root User.mp4 (8.0 MB)
  • 4. Color Coding for Root User.srt (1.0 KB)
  • 4.1 Bashrc File.html (0.1 KB)
  • 5. Install Windows (Victim's Machine).mp4 (16.3 MB)
  • 5. Install Windows (Victim's Machine).srt (2.2 KB)
  • 5.1 Windows 10 Trial.html (0.1 KB)
  • 5.2 KALI VMWARE image.html (0.1 KB)
  • 5.3 VMWARE Player.html (0.2 KB)
3. Explore KALI
  • 1. Master KALI Desktop Environment.mp4 (33.5 MB)
  • 1. Master KALI Desktop Environment.srt (2.6 KB)
  • 2. Color Coding.mp4 (15.4 MB)
  • 2. Color Coding.srt (1.8 KB)
4. Setup Your KALI Server
  • 1. Get Started with Linux Commands.mp4 (75.5 MB)
  • 1. Get Started with Linux Commands.srt (10.3 KB)
  • 2. Explore Main Services and Programs.mp4 (69.2 MB)
  • 2. Explore Main Services and Programs.srt (5.6 KB)
5. Steps to Plan a Successful Penetration Test
  • 1. Penetration Testing Cycle.mp4 (15.9 MB)
  • 1. Penetration Testing Cycle.srt (5.1 KB)
  • 2. Threat Modeling.mp4 (42.7 MB)
  • 2. Threat Modeling.srt (6.8 KB)
6. 9+ Ways to Attack a Network
  • 1. Wireshark Simplified.mp4 (63.3 MB)
  • 1. Wireshark Simplified.srt (8.0 KB)
  • Code:

    • udp://explodie.org:6969/announce
    • udp://tracker.torrent.eu.org:451/announce
    • udp://tracker.kamigami.org:2710/announce
    • https://tracker.nanoha.org:443/announce
    • udp://retracker.akado-ural.ru:80/announce
    • udp://opentor.org:2710/announce
    • http://h4.trakx.nibba.trade:80/announce
    • udp://xxxtor.com:2710/announce
    • udp://opentracker.i2p.rocks:6969/announce
    • udp://tracker.zerobytes.xyz:1337/announce
    • https://tracker.nitrix.me:443/announce
    • https://t1.leech.ie:443/announce
    • udp://open.stealth.si:80/announce