Zakazane produkcje
Znajdź zawartość
Wyświetlanie wyników dla tagów 'Reconnaissance' .
Znaleziono 5 wyników
-
Free Download Scanning and Reconnaissance with Metasploit Released 10/2024 By Dale Meredith MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 35m | Size: 103 MB This course will teach you how to effectively use the Metasploit Framework for network scanning and reconnaissance, key components of penetration testing. In this course, Scanning and Reconnaissance with Metasploit, you'll learn how to conduct network scanning and reconnaissance using the Metasploit Framework, one of the most powerful tools for penetration testers. First, you'll explore the different types of scanning modules available within Metasploit and learn how to differentiate between active and passive reconnaissance techniques. Next, you'll discover how to identify live hosts and open ports using network discovery and enumeration tools. Finally, you'll learn how to use Metasploit's auxiliary modules to gather additional reconnaissance data and assess vulnerabilities. When you're finished with this course, you'll have the skills and knowledge to perform effective reconnaissance and scanning, essential components in the penetration testing process. Homepage https://www.pluralsight.com/courses/scanning-reconnaissance-metasploit Screenshot Rapidgator https://rg.to/file/37a4a668451f297f9b2df55abe09074f/qawtk.Scanning.and.Reconnaissance.with.Metasploit.rar.html Fikper Free Download https://fikper.com/4kzl6P4Twa/qawtk.Scanning.and.Reconnaissance.with.Metasploit.rar.html No Password - Links are Interchangeable
-
- Scanning
- Reconnaissance
-
(i 1 więcej)
Oznaczone tagami:
-
Free Download Udemy - Ai For Reconnaissance And Osint Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 1.81 GB | Duration: 3h 5m a look at using AI What you'll learn About AI Use of AI for reconnaissance use of AI for OSINT Ethical considerations Requirements Internet connection Description In the rapidly evolving field of cybersecurity, understanding the power of artificial intelligence in reconnaissance and Open Source Intelligence (OSINT) is crucial. This online course is designed for all levels of expertise, from beginners to seasoned professionals, who are eager to enhance their skills with cutting-edge AI tools specifically in the context of reconnaissance and OSINT applications.Course Highlights:Sock Puppets: Learn how to create and manage anonymous online personas for effective intelligence gathering.Virtual Machines (VMs): Explore the use of VMs for safe and isolated reconnaissance activities.Photo Analysis: Understand techniques for analyzing images to extract valuable information.AI Voice and Detection: Discover tools for voice synthesis and detection to enhance social engineering tactics.Web Scraping (Basic): Get hands-on experience with basic web scraping techniques to gather data from various sources.Social Engineering: Delve into AI-assisted social engineering strategies to improve your reconnaissance efforts.Report Writing and Templates with AI: Learn how to efficiently compile your findings into professional reports using AI-generated templates.Jailbreaking and Lying to AI: Explore advanced techniques for manipulating AI models to bypass restrictions and extract information.Phishing with AI: Understand the ethical implications and methodologies of using AI in phishing simulations.Prerequisites: This course is not recommended for those who have completed previous courses on similar topics, as many of the tools and techniques covered may overlap. If you're seeking a comprehensive introduction to ethical hacking or OSINT, please consider enrolling in my other courses.Join us to unlock the potential of AI in reconnaissance and OSINT, and stay ahead in the ever-changing landscape of cybersecurity! Overview Section 1: Introduction Lecture 1 Introduction and expectations Lecture 2 Disclaimer and legal considerations Lecture 3 What is reconnaissance and OSINT Lecture 4 AI Considerations (Use of data, accuracy, how current is the information) Section 2: Optional VM (Virtual Machine) Lecture 5 What is a VM (Virtual machine) Lecture 6 Choosing an OS Lecture 7 Setting up VirtualBox Section 3: Sock puppets Lecture 8 Sock Puppets Tutorial Section 4: Additional pre-reconnaissance and OSINT considerations Lecture 9 Written permissions and scope Section 5: Misc. AI Lecture 10 Lie to me Talking to GPT to do what we want Lecture 11 Can you jailbreak AI? Lecture 12 AI for report writing Lecture 13 Web scraper Lecture 14 Darkweb AI tools overview Section 6: AI Coding Lecture 15 Using AI to write programs for you Lecture 16 Using AI to understand code Section 7: Social Engineering Lecture 17 What is social engineering SE Lecture 18 AI Social Engineering example Lecture 19 AI Voice Lecture 20 Deepfakes Section 8: Phishing with AI Lecture 21 Having AI outline our phishing attack Section 9: AI Photos Lecture 22 AI Reverse image Lecture 23 AI Geo location Lecture 24 Image enhancement Section 10: AI detection Lecture 25 AI generated photos Lecture 26 AI generated voice Lecture 27 AI Generated video Lecture 28 AI generated text Section 11: AI Pentesting Lecture 29 Can I fully automate X? Section 12: Wrapping up Lecture 30 Are there more tools? Lecture 31 Resources Anyone interested in leveraging AI for reconnaissance and for OSINT Homepage https://www.udemy.com/course/ai-for-reconnaissance-and-osint/ Rapidgator https://rg.to/file/2d102a35dc71e339fe82340ce3fbbb86/cipwl.Ai.For.Reconnaissance.And.Osint.part1.rar.html https://rg.to/file/35583c0133508de6e0bfed69a1b26fcb/cipwl.Ai.For.Reconnaissance.And.Osint.part2.rar.html Fikper Free Download https://fikper.com/HARyUmarXD/cipwl.Ai.For.Reconnaissance.And.Osint.part1.rar https://fikper.com/IyfymkNMZT/cipwl.Ai.For.Reconnaissance.And.Osint.part2.rar No Password - Links are Interchangeable
-
- Udemy
- Reconnaissance
-
(i 1 więcej)
Oznaczone tagami:
-
Free Download Special Reconnaissance and Advanced Small Unit Patrolling: Tactics, Techniques and Procedures for Special Operations Forces (Audiobook) English | ASIN: B0DC853YF7 | 2024 | 23 hours and 43 minutes | M4B@64 kbps | 673 MB Author: Lieutenant Colonel Ed Edward Wolcoff Narrator: David de Vries This comprehensive guide by a Special Ops combat veteran is the ultimate reference for military tactics, techniques, and procedures. Intended for military SpecialOps personnel, this volume presents invaluable operational guidance with lessons learned from the legendary Military Assistance Command Vietnam-Studies and Observations Group (MACV-SOG). Drawing on Special Reconnaissance operations conducted during the Vietnam Era, author Edward Wolcoff provides practical information alongside operational accounts and analyses of specific missions. Wolcoff covers the gamut of specialized SR topics ranging from operational planning and preparation, through execution, logistics, and command and control-all in substantial tradecraft detail. Few of the tactics, techniques, and procedures or lessons-learned included in this book have been previously presented in a usable form for SpecOps personnel. This book is intended instruct the Special Operations units of today, and preserve this valuable tradecraft for future generations. Rapidgator https://rg.to/file/9797677c616bbf9301a6e20fa2a3addc/nq62r.rar.html Fikper Free Download https://fikper.com/BBBNajq2sS/nq62r.rar.html Links are Interchangeable - No Password - Single Extraction
-
- Special
- Reconnaissance
-
(i 3 więcej)
Oznaczone tagami:
-
External Footprinting: Reconnaissance and Mapping September 2016 | MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 148 MB Genre: eLearning | Language: English This course will teach you 15+ techniques in the scope of identifying targets, passive and active reconnaissance, hunting weak web applications, and prioritizing your efforts. A solid understanding of external footprinting techniques is critical to being an effective penetration tester. It can be the difference between breaking into an organization and having little to show for your efforts. This course, External Footprinting: Reconnaissance and Mapping, will challenge you by starting with a real world company and enumerating 10,000+ IPv4/IPv6 addresses and domain names used by the company. You will also get to utilize 15+ techniques for identifying targets, gathering host information, hunting weak web applications, and prioritizing your efforts. When you have finished with this course, you should have a solid understanding of external footprinting, passive/active reconnaissance, and the techniques discussed in the Penetration Testing Execution Standard (PTES). Software Required: Kali Linux. Download link: http://rapidgator.net/file/99933291a8f30c0286d28cb89c807a35/b5vav.External.Footprinting.Reconnaissance.and.Mapping.2016.rar.html]b5vav.External.Footprinting.Reconnaissance.and.Mapping.2016.rar.html http://nitroflare.com/view/C5DF4CD000E2CA2/b5vav.External.Footprinting.Reconnaissance.and.Mapping.2016.rar]b5vav.External.Footprinting.Reconnaissance.and.Mapping.2016.rar http://uploaded.net/file/mxv9e4v7/b5vav.External.Footprinting.Reconnaissance.and.Mapping.2016.rar]b5vav.External.Footprinting.Reconnaissance.and.Mapping.2016.rar https://www.bigfile.to/file/k7zCuaxXmyyR/b5vav.External.Footprinting.Reconnaissance.and.Mapping.2016.rar]b5vav.External.Footprinting.Reconnaissance.and.Mapping.2016.rar Links are Interchangeable - No Password - Single Extraction
-
- external
- footprinting
-
(i 4 więcej)
Oznaczone tagami:
-
External Footprinting: Reconnaissance and Mapping September 2016 | MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 148 MB Genre: eLearning | Language: English This course will teach you 15+ techniques in the scope of identifying targets, passive and active reconnaissance, hunting weak web applications, and prioritizing your efforts. A solid understanding of external footprinting techniques is critical to being an effective penetration tester. It can be the difference between breaking into an organization and having little to show for your efforts. This course, External Footprinting: Reconnaissance and Mapping, will challenge you by starting with a real world company and enumerating 10,000+ IPv4/IPv6 addresses and domain names used by the company. You will also get to utilize 15+ techniques for identifying targets, gathering host information, hunting weak web applications, and prioritizing your efforts. When you have finished with this course, you should have a solid understanding of external footprinting, passive/active reconnaissance, and the techniques discussed in the Penetration Testing Execution Standard (PTES). Software Required: Kali Linux. DOWNLOAD http://rapidgator.net/file/47bb58525441e70d635267f7041bb7a4/acc1h.External.Footprinting.Reconnaissance.and.Mapping.2016.rar.html https://bytewhale.com/iqsq9hi5b7rs/acc1h.External.Footprinting.Reconnaissance.and.Mapping.2016.rar http://uploaded.net/file/jpqfp7tu/acc1h.External.Footprinting.Reconnaissance.and.Mapping.2016.rar https://www.bigfile.to/file/euUpfdQ2yHQ7/acc1h.External.Footprinting.Reconnaissance.and.Mapping.2016.rar http://nitroflare.com/view/14517428C596748/acc1h.External.Footprinting.Reconnaissance.and.Mapping.2016.rar http://uploadgig.com/file/download/F0f9247e8e946cad/acc1h.External.Footprinting.Reconnaissance.and.Mapping.2016.rar
-
- external
- footprinting
-
(i 4 więcej)
Oznaczone tagami: