Daftar Konten:
total 4.5G
8.3M 1-welcomemkv.mkv
13M 2-system-requirementsmkv.mkv
1.5M 3-what-this-course-will-cover.mp4
1.9M 4-prerequisites.mp4
4.1M 5-aquring-dradis.mp4
2.7M 6-installing-dradis.mp4
3.7M 8-using-dradis.mp4
2.1M 9-adding-notes.mp4
3.0M 9-categorizing-information.mp4
5.2M 10-review-of-scan-types.mp4
41M 11-advanced-scanningmkv.mkv
36M 12-scripting-enginemkv.mkv
107M 13-investigating-scan-types-with-wiresharkmkv.mkv
24M 14-importing-results-to-dradismkv.mkv
38M 15-aquiring-nessusmkv.mkv
53M 16-setting-up-nessusmkv.mkv
36M 17-configuring-nessusmkv.mkv
26M 18-scan-details-networkmkv.mkv
36M 19-scan-details-credentials-plugins-optionsmkv.mkv
57M 20-scan-details-web-applicationsmkv.mkv
19M 21-starting-scanmkv.mkv
71M 22-reviewing-resultsmkv.mkv
52M 23-false-positivesmkv.mkv
18M 24-setting-up-jobsmkv.mkv
43M 25-acquiring-nexposemkv.mkv
18M 26-setting-up-nexposemkv.mkv
40M 27-configuring-nexposemkv.mkv
45M 28-adding-hosts-to-nexposemkv.mkv
61M 29-reviewing-results-manual-checksmkv.mkv
66M 30-netcatmkv.mkv
81M 31-protocol-checkingmkv.mkv
91M 32-ssl-clientmkv.mkv
95M 33-sslscanmkv.mkv
73M 34-snmpwalkmkv.mkv
4.9M 35-acquiring-metasploitmkv.mkv
1.9M 36-setting-up-metasploitmkv.mkv
38M 37-metasploit-web-interfacemkv.mkv
21M 38-configuring-workspacesmkv.mkv
33M 39-running-nmp-from-metasploitmkv.mkv
30M 40-import-nessus-resultsmkv.mkv
76M 41-scanning-with-metasploitmkv.mkv
80M 42-looking-at-vulnerabilitiesmkv.mkv
52M 43-searching-vulnerabilitesmkv.mkv
49M 44-running-exploitsmkv.mkv
68M 45-post-exploitation-data-gatheringmkv.mkv
43M 46-pivoting-tunnelingmkv.mkv
94M 47-writing-an-msf-pluginmkv.mkv
103M 48-writing-fuzzersmkv.mkv
25M 49-social-engineering-toolkitmkv.mkv
89M 50-spear-phishingmkv.mkv
95M 51-browser-plugins-with-chromemkv.mkv
48M 52-browser-plugins-with-firefoxmkv.mkv
53M 53-tamperdatamkv.mkv
27M 54-performing-injectionsmkv.mkv
113M 55-cookie-data-with-tamperdatamkv.mkv
59M 56-sql-inject-memkv.mkv
55M 57-xss-memkv.mkv
85M 58-firebugmkv.mkv
62M 59-hackbarmkv.mkv
40M 60-wappalyzermkv.mkv
86M 61-passive-reconmkv.mkv
34M 62-groundspeedmkv.mkv
73M 63-acquiring-webgoatmkv.mkv
25M 64-practicing-web-application-attacksmkv.mkv
40M 65-basics-of-webgoatmkv.mkv
63M 66-working-through-lessonsmkv.mkv
30M 67-acquiring-burpsuitemkv.mkv
23M 68-installing-burpsuitemkv.mkv
23M 69-running-burpsuite-configuring-your-browsermkv.mkv
34M 70-spideringmkv.mkv
36M 71-passive-scanningmkv.mkv
49M 72-active-scanningmkv.mkv
89M 73-investigating-resultsmkv.mkv
41M 74-password-attacksmkv.mkv
86M 75-fuzzing-attacksmkv.mkv
51M 76-doing-sequencingmkv.mkv
70M 77-using-the-intrudermkv.mkv
22M 78-acquiring-w3afmkv.mkv
31M 79-installing-w3afmkv.mkv
20M 80-running-w3afmkv.mkv
54M 81-configuring-w3afmkv.mkv
62M 82-acquiring-configuring-zed-attack-proxy-zapmkv.mkv
38M 83-quick-start-with-zapmkv.mkv
47M 84-scanning-with-zapmkv.mkv
41M 85-spidering-with-zapmkv.mkv
47M 86-fuzzing-with-zapmkv.mkv
46M 87-web-architecturemkv.mkv
32M 88-basics-of-sql-injectionmkv.mkv
57M 89-manual-testingmkv.mkv
127M 90-sqlmapmkv.mkv
40M 91-command-injectionmkv.mkv
35M 92-cross-site-scriptingmkv.mkv
63M 93-spear-phishingmkv.mkv
20M 94-cross-site-request-forgerymkv.mkv
70M 95-roque-serversmkv.mkv
122M 96-spoofed-certificatesmkv.mkv
7.0M 97-course-wrap-upmkv.mkv
9.9M 98-next-stepsmkv.mkv
RAR tidak bisa digunakan sebelum semua bagian terdownload
Beberapa konten mungkin penomorannya salah. Silahkan di download, dilihat dan dikoreksi. PERHATIAN! Semua part harus terdownload dan diletakkan dalam 1 folder agar proses ekstrak berhasil.