Home » Tag cloud » Penetration
Category: Tutorial
Penetration Testing the Right Way

Penetration Testing the Right Way
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 190 MB
Genre: eLearning | Language: English

Download Now
Read More
Category: E-Book

Mastering Kali Linux for Advanced Penetration Testing

Robert W. Beggs, "Mastering Kali Linux for Advanced Penetration Testing"
English | 2014 | ISBN: 1782163123 | 325 pages | PDF | 9 MB

Download Now
Read More
Category: Tutorial
Become a Professional Penetration Tester
Become a Professional Penetration Tester
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 5.5 Hours | Lec: 58 | 1.21 GB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial
Offensive Security - Penetration Testing With Kali

Offensive Security - Penetration Testing With Kali
English | Size: 0.98 GB
Category: CBTs
Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique penetration testing training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials. Penetration Testing with Kali Linux simulates a full penetration test from start to finish, by injecting the student into a target-rich, diverse, and vulnerable network environment
Download Now
Read More
Category: Tutorial

Penetration Testing The Big Picture

Penetration Testing: The Big Picture
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 180 MB
Genre: eLearning | Language: English

Download Now
Read More
Category: Tutorial

Penetration Orgasm Mastery
Penetration Orgasm Mastery
37xDVDRip | MP4/AVC, ~472 kb/s | 480x270 | Duration: ~10 hours | English: AAC, 64 kb/s (2 ch) | 1.84 GB
Genre: Dating, Relationships, Sex, Psychology

How to Use a Little-Known Caveman Secret To Make Her PERMANENTLY Addicted to Your Cock
Download Now
Read More
Category: E-Book
Learning iOS Penetration Testing

Learning iOS Penetration Testing
by Swaroop Yermalkar
English | 2016 | ISBN: 1785883259 | 201 Pages | True PDF | 12 MB
Download Now
Read More
Category: Tutorial
Penetration Testing with Metasploit & Analyzing the IDS logs

Penetration Testing with Metasploit & Analyzing the IDS logs
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 29 | 268 MB
Genre: eLearning | Language: English
Learn to conduct PenTesting / White Hacking using Metasploit plus Analyzing the Intrusion Detection System (IDS) events
Download Now
Category: E-Book
Percutaneous Penetration Enhancers Physical Methods in Penetration Enhancement

Percutaneous Penetration Enhancers Physical Methods in Penetration Enhancement by Nina Dragicevic
English | 12 May 2017 | ISBN: 3662532719 | 508 Pages | PDF | 17.13 MB
Percutaneous Penetration Enhancers in a mini-series format comprising five volumes, represents the most comprehensive reference on enhancement methods - both well established and recently introduced - in the field of dermal/transdermal drug delivery.
Download Now
Read More
Category: Tutorial
SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)

SANS SEC660 Advanced Penetration Testing, Exploits, And Ethical Hacking (2014)
English | Size: 513.36 MB
Category: Tutorial

SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and ShiChuang restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP), ShiChuang exploit-writing, and much more!
Download Now