Zakazane produkcje
Znajdź zawartość
Wyświetlanie wyników dla tagów 'Exploitation' .
Znaleziono 4 wyniki
-
Free Download Exploitation and Post-exploitation with Metasploit Released 10/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 31m | Size: 85 MB This course teaches you how to exploit and maintain access to vulnerable systems using Metasploit. You'll gain practical skills in exploiting known vulnerabilities and conducting post-exploitation with Meterpreter. In today's crazy world of threats, understanding how to exploit and leverage vulnerabilities is crucial for effective penetration testing. In this course, Exploitation and Post-exploitation with Metasploit, you'll learn how to exploit known vulnerabilities using the Metasploit Framework and perform advanced post-exploitation tasks. First, you'll explore how to use Metasploit's vulnerability database to identify and exploit weaknesses in target systems. Next, you'll discover how to maintain access and control over compromised systems using Meterpreter, including privilege escalation and lateral movement. Finally, you'll learn how to exfiltrate sensitive data while maintaining stealth and persistence on the target. By the end of this course, you'll have the practical skills and knowledge needed to carry out advanced exploitation and post-exploitation techniques using Metasploit. Homepage https://www.pluralsight.com/courses/exploitation-post-exploitation-metasploit Rapidgator https://rg.to/file/125d7fade14765197ec6b3e29eea4639/chxce.Exploitation.and.Postexploitation.with.Metasploit.rar.html Fikper Free Download https://fikper.com/Lr9fYlqiqi/chxce.Exploitation.and.Postexploitation.with.Metasploit.rar.html No Password - Links are Interchangeable
-
- Exploitation
- Post
-
(i 1 więcej)
Oznaczone tagami:
-
pdf | 12.19 MB | English| Isbn:9781597494878 | Author: Computer Science Perla B.Sc., Massimiliano Oldani | Year: 2010 Description: Category:Computers, Computers - General & Miscellaneous, Computer Security https://ddownload.com/obbcmaw42jgi https://rapidgator.net/file/b3cc12347c47f1c08d0d8e7408725482/ https://turbobit.net/o1758k8l9cv9.html
-
Node.js Security: Pentesting and Exploitation English | 2015 | mp4 | H264 1152x720 | AAC 2 ch | 2 hrs | 206 MB eLearning, IT & Software, Network & Security | Skill level: all level Learn about Node.js Security by Code Review, Pentesting and Automation. Node.jsÂ? is a platform built on Chrome's javascript runtime for easily building fast, scalable network applications. This new technology is widely getting adopted in various organisations. Like any platform, Node.js has it's on set of features that developers blindly use without much thought on security. The heart of Node is javascript, so it inherits most of the issues that are found at client side javascript. However on the server side, it executes on V8 javascript engine which gives node the capabilities similar to that of any other server side scripting languages. That difference adds some unique attack surface to Node.js platform. Node.js Security: Pentesting & Exploitation course is one it's kind to teach about Node.js Security. This course is designed in such a way to address both the requirements of a Web Developer as well as a Web Pentester. For a Web Developer, he will get to know about secure coding, what all things can make his code insecure and how to identify security issues in his code. For the Web Security guy, it gives him an idea on how he should go with securing Node.js Application by performing effective Code Review, Implementing Secure Code, Pentesting, Automating the process of Code Review and finally exploiting the vulnerabilities identified. As a take away, this course will introduce an open source Node.js Security Analysis tool named NodeJsScan, a Node.js Static Analysis Tool that can detect possible security issues, insecure code and outdated libraries. This tool allows you to extend the scan using it's customisable rule set. You can add your own rules on the go to catch security issues. Finally this course is one of it's kind with hands on demonstration and walkthrough on identifying security issues, exploiting and fixing them. The course will cover the following thing * Introduction * Node Specific Security Issues * Global Namespace Pollution * HTTP Parameter Pollution (HPP) * eval() is Evil * Remote OS Command Execution * Untrusted User Input * Regex DoS * Information Disclosure * Lack of Secure Code * Code Review * Automated Code Review with NodeJsScan What are the requirements? - Fundamentals of Web Applications - How to write and run a simple Node.js application What am I going to get from this course? - Over 14 lectures and 1 hour of content! - Learn how to do the Security Certification of Node.js Application - Learn how to build a secure Node.js Application - Learn how things can go wrong in Node.js - Learn to find security issues in Node.js Applications - Learn how to exploit the issues for PoC What is the target audience? - Web Developers - Web Application Pentesters - Security Engineers - Web Application Security Consultants - Web Security Enthusiasts - Hackers - Students - Web Application Designers Buy Premium Account To Get Resumable Support & Max Speed http://www.nitroflare.com/view/479CCE6E731281D/yubrh.Node.js.Security.Pentesting.and.Exploitation.rar http://rapidgator.net/file/c54725f9fbe26715e47cd30180224956/yubrh.Node.js.Security.Pentesting.and.Exploitation.rar.html http://www.uploadable.ch/file/tE7znZ54DnXQ/yubrh.Node.js.Security.Pentesting.and.Exploitation.rar Links are Interchangeable - No Password
-
Cybrary - Post Exploitation Hacking - Persistence and Continued Access | 1.33 Gb Genre: eLearning Exploitation Hacking Training Post Exploitation Persistence and Continued Access As the name implies, Post Exploitation Hacking ??â??" Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth??â??"but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal their identity and exploit their target covertly and consistently for intelligence and to accomplish the mission. In this free self-paced online training course, you??â??ll cover three main topics: Information Gathering, Backdooring and Covering Steps. You??â??ll learn about how to use system specific tools to get general information about a system and its users, how to access the compromised system at any time, and how to hide your activity from system administrators. Additionally, you??â??ll master how to use listener shells, metasploit and meterpreter scripting. DOWNLOAD http://rapidgator.net/file/67dd93236a1e1ad0d77da55b83de35fb/Post.part1.rar.html http://rapidgator.net/file/671ca6b283e852a7ea9a2d205b1719bc/Post.part2.rar.html http://rapidgator.net/file/a20b1b21300d1a2148e23306d194b84b/Post.part3.rar.html http://rapidgator.net/file/6cd3cd08a92ccccd14f836b6fab2e89e/Post.part4.rar.html http://rapidgator.net/file/b6a2cd8182e41d75fc51c4b745ff6a04/Post.part5.rar.html http://rapidgator.net/file/f1acb9abc577677cd0689346cac4fbd4/Post.part6.rar.html http://uploaded.net/file/rwid4sld/Post.part1.rar http://uploaded.net/file/vxkrajlz/Post.part2.rar http://uploaded.net/file/v5uutli6/Post.part3.rar http://uploaded.net/file/u6yj7xje/Post.part4.rar http://uploaded.net/file/zaa1v1by/Post.part5.rar http://uploaded.net/file/b7e094pa/Post.part6.rar http://www.uploadable.ch/file/NjZNPpvBpmkq/Post.part1.rar http://www.uploadable.ch/file/3XTeCMb9ze7B/Post.part2.rar http://www.uploadable.ch/file/57s2ByCSDGPb/Post.part3.rar http://www.uploadable.ch/file/ed9YtTewhKqK/Post.part4.rar http://www.uploadable.ch/file/AYHnjYMPk2xg/Post.part5.rar http://www.uploadable.ch/file/X8sA5gAr6BkN/Post.part6.rar http://turbobit.net/6nik6jb0u8qv/Post.part1.rar.html http://turbobit.net/9mq0ps2r3h8y/Post.part2.rar.html http://turbobit.net/v4pop3um31ze/Post.part3.rar.html http://turbobit.net/ris1u9yof4fi/Post.part4.rar.html http://turbobit.net/gjun5cg8oi1r/Post.part5.rar.html http://turbobit.net/f296r7ndnllw/Post.part6.rar.html