NetWork Penetration Testing Essentials (PEN - 100) - Erik Choron (Feb 2025)

0dayddl

U P L O A D E R
541636287_oip.jpg

18.97 GB | 00:09:34 | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English


Files Included :
1 Adding more to our security toolkit (184.89 MB)
10 Challenge (68.66 MB)
2 What will Pen-100 cover (261.15 MB)
3 Building Blocks (213.42 MB)
4 Understanding Virtualization (71.64 MB)
5 Type 1 and Type 2 (66.17 MB)
6 Type 2 (33.57 MB)
7 We need permission! (119.22 MB)
8 We need permission! Part 2 (61.97 MB)
9 We need permission! Part 3 (38.26 MB)
1 Baby steps before running (118.5 MB)
10 Solution (236.81 MB)
2 pseudocode (356.47 MB)
3 Where do we script at (275.89 MB)
4 Where do we script at Part 2 (78.23 MB)
5 For Loop (115.45 MB)
6 Using our loop knowledge to check the network (208.44 MB)
7 Saving our work (58.08 MB)
8 Scripting for more details (112.36 MB)
9 Challenge (112.58 MB)
1 Let's learn another loop (89.67 MB)
10 Solution (141.16 MB)
2 Python requirements (109.99 MB)
3 Why Python (109.56 MB)
4 Why Python Part 2 (255.38 MB)
5 Remember Environment Variables (82.7 MB)
6 Scanning with Python (201.13 MB)
7 What's Scapy (225.51 MB)
8 What's the difference between the two (153.32 MB)
9 Challenge (131.54 MB)
1 Introduction (153.32 MB)
2 Bash (89.4 MB)
3 Scripting in Bash (86.84 MB)
4 Scripting in Bash Part 2 (51.06 MB)
5 Making sure we stay in Bash (64.45 MB)
6 Creating a program to run in Bash (70.07 MB)
7 Creating a program to run in Bash Part 2 (86.76 MB)
8 Challenge (48.74 MB)
9 Solution (82.86 MB)
1 Kali being used for good (149.07 MB)
10 Challenge (87.65 MB)
11 Solution (44.45 MB)
2 Kali being used for good Part 2 (96.45 MB)
3 Kali being used for good (48.98 MB)
4 Monitoring and discovering networks Part 1 (64.08 MB)
5 Monitoring and discovering networks Part 2 (18.81 MB)
6 Monitoring and discovering networks Part 3 (40.2 MB)
7 Monitoring and discovering networks Part 4 (52.24 MB)
8 Monitoring for hidden networks (131.15 MB)
9 Monitoring for hidden networks Part 2 (84.74 MB)
1 Metasploit Framework (165.66 MB)
2 Metasploit on Kali (350.9 MB)
3 Systems Without Metasploit (345.83 MB)
4 How to Prep the Target (203.1 MB)
5 Other Metasploit Add-Ins (176.51 MB)
6 Options Outside of Metasploit (164.01 MB)
1 Cryptography Overview (155.18 MB)
2 Synchronous Crypto (219.71 MB)
3 Synchronous Crypto Examples (323.73 MB)
4 Asynchronous Crypto (215.63 MB)
5 Asynchronous Crypto Example (300.05 MB)
6 Cryptography Review (36.78 MB)
1 Knowing our targets (143.9 MB)
2 Web Application Backbone (100.88 MB)
3 Web Application Backbone Part 2 (87.35 MB)
4 POSIX-Based - Apache (69.06 MB)
5 POSIX-Based - Apache Part 2 (27.93 MB)
6 Discovering Web Application use on a target (76.59 MB)
7 Challenge (35.98 MB)
8 Solution (135.89 MB)
1 What is Active Directory (170.48 MB)
2 Installing Active Directory (74.51 MB)
3 Post Install (73.28 MB)
4 Post Install Part 2 (16.17 MB)
5 User and Group information (66.48 MB)
6 Policy Enforcement (53.52 MB)
7 Challenge (28.68 MB)
8 Solution (114.26 MB)
1 What is Kali (59.63 MB)
2 What is Kali Part 2 (60.07 MB)
3 Picking our Kali (60.34 MB)
4 Picking our Kali Part 2 (63.53 MB)
5 Downloading and installing Kali (96.09 MB)
6 Downloading and installing Kali Part 2 (71.88 MB)
7 Live Kali (68.68 MB)
8 Challenge (38.15 MB)
9 Solution (46.99 MB)
1 POSIX-Based Systems (135.75 MB)
10 Challenge (50.46 MB)
11 Solution (72.87 MB)
2 Formatting (147.12 MB)
3 Formatting Part 2 (98.33 MB)
4 Directory Structure (312.46 MB)
5 Missing File Types (216.91 MB)
6 File Permissions (291.96 MB)
7 Usernames and Passwords (296.62 MB)
8 Services and Logs (156.32 MB)
9 Services (218.65 MB)
1 Getting to know Windows (127.59 MB)
2 Formatting (82.04 MB)
3 Formatting Part 2 (29.1 MB)
4 Directory Structuring (81.73 MB)
5 Directory Structuring Part 2 (30.68 MB)
6 File Types (79.81 MB)
7 Username and Passwords (110.72 MB)
8 Challenge (32.5 MB)
9 Solution (45.11 MB)
1 Getting into the Windows Operating System (190.44 MB)
10 Challenge (36.48 MB)
11 Solution (109.09 MB)
2 Local Security Policy (298.92 MB)
3 Local Security Policy Part 2 (271.45 MB)
4 Registry (321.21 MB)
5 Registry Part 2 (210.05 MB)
6 Temporary and Hidden Folders (240.95 MB)
7 Disk Management (111.11 MB)
8 Services and Logs (172.48 MB)
9 Logging (249.63 MB)
1 Linux Networking (124.16 MB)
2 ifconfig (87.94 MB)
3 Where did those interfaces come from (25.67 MB)
4 DNS Configuration (43.94 MB)
5 Routing Configuration (61.06 MB)
6 iptables (95.53 MB)
7 GUI help (17.06 MB)
8 Challenge (39.49 MB)
9 Solution (38.44 MB)
1 Windows Networking (64.57 MB)
10 Solution (87.62 MB)
2 Looping back (223.58 MB)
3 Hardware in VMWare (338.01 MB)
4 Windows PowerShell (303.98 MB)
5 Wireshark (409.65 MB)
6 promisc (110 MB)
7 Windows Firewall (180.51 MB)
8 Wireshark (143.19 MB)
9 Challenge (17.4 MB)
1 Understanding how the network talks (123.85 MB)
10 Bonus video (163.7 MB)
2 Scoping things out (52.7 MB)
3 Scoping things out part 2 (85.05 MB)
4 Capturing some traffic (51.1 MB)
5 Wireshark (116.51 MB)
6 tcpdump (55.83 MB)
7 Active and passive listening (74.03 MB)
8 Challenge (21.84 MB)
9 Solution (32.44 MB)
1 Wireless Networks (229.19 MB)
10 Solution (48.51 MB)
2 Heat mapping (115.81 MB)
3 Addendum (184.77 MB)
4 Wireless Channels and Rogue Access Points (46.54 MB)
5 Going Rogue (235.12 MB)
6 Wireless Promiscuous (62.74 MB)
7 Kismet (69.17 MB)
8 Kismet Part 2 (66.84 MB)
9 Challenge (7.44 MB)
]
Screenshot
FbIb9Zw5_o.jpg



Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten