Home » Tag cloud » Penetration
Category: Tutorial
Penetration Testing with Metasploit & Analyzing the IDS logs

Penetration Testing with Metasploit & Analyzing the IDS logs
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 29 | 268 MB
Genre: eLearning | Language: English
Learn to conduct PenTesting / White Hacking using Metasploit plus Analyzing the Intrusion Detection System (IDS) events
Download Now
Category: E-Book
Percutaneous Penetration Enhancers Physical Methods in Penetration Enhancement

Percutaneous Penetration Enhancers Physical Methods in Penetration Enhancement by Nina Dragicevic
English | 12 May 2017 | ISBN: 3662532719 | 508 Pages | PDF | 17.13 MB
Percutaneous Penetration Enhancers in a mini-series format comprising five volumes, represents the most comprehensive reference on enhancement methods - both well established and recently introduced - in the field of dermal/transdermal drug delivery.
Download Now
Read More
Category: Tutorial
SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)

SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)
English | Size: 513.36 MB
Category: Tutorial

SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and ShiChuang restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP), ShiChuang exploit-writing, and much more!
Download Now
Category: Tutorial
SANS SEC760 Advanced Exploit Development for Penetration Testers (2014) PDFs

SANS SEC760 Advanced Exploit Development for Penetration Testers (2014) PDFs
English | Size: 4.33 GB
Category: Tutorial

SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, analyze patches for 1-day exploits, and write complex exploit, such as use-after-free attacks against modern software and operating systems.
Download Now
Category: Tutorial
OPSEC for Penetration Testers (Complete)

OPSEC for Penetration Testers
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 275 MB
Genre: eLearning | Language: English
This course will teach you what operational security (OPSEC) is, and how to apply proper OPSEC methods to your penetration testing workflow.
Download Now
Category: Tutorial
Security Penetration Testing (The Art of Hacking Series)
Security Penetration Testing (The Art of Hacking Series)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | 6.54 GB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial

Security Penetration Testing (The Art of Hacking Series) LiveLessons
Security Penetration Testing (The Art of Hacking Series) LiveLessons
by Chris McCoy, Ron Taylor, Jon Sternstein, Omar Santos
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | 6.54 GB
Genre: eLearning | Language: English

This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture.
Download Now
Category: E-Book
Kali Linux 2: Windows Penetration Testing

Kali Linux 2: ShiChuang Penetration Testing by Wolf Halton, Bo Weaver
English | June 28th, 2016 | ASIN: B013GKGL94, ISBN: 1782168494 | 422 pages | AZW3 | 31.31 MB
If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems and the BASH terminal emulator along with ShiChuang desktop and command line would be highly beneficial.
Download Now
Read More
Category: Tutorial

Packt - Kali Linux Backtrack Evolved Assuring Security by Penetration Testing

Packt - Kali Linux Backtrack Evolved: Assuring Security by Penetration Testing
English | Size: 573.34 MB
Category: Video Training

Secure your networks against attacks, hacks, and intruders with this fast paced and intensive security course using Kali Linux

Download Now
Read More
Category: E-Book
WiFi Hacking for Beginners: Learn Hacking by Hacking WiFi networks (Penetration testing, Hacking, Wireless Networks)

WiFi Hacking for Beginners: Learn Hacking by Hacking WiFi networks (Penetration testing, Hacking, Wireless Networks)
English | 2017 | ASIN: B073PL9JF6 | 24 pages | AZW3/PDF/EPUB (conv) | 1 Mb
Download Now
Read More