[ WebToolTip.com ] Udemy - Windows Exploitation - 45 Ethical Hacks and Exploits

文件大小

3.74 GB

上传时间

2025-09-26

Hash

b3f5a7b325eac9f8146bd4d5e4bc40cc87effa51

文件列表

  • Get Bonus Downloads Here.url0.00 MB
  • ~Get Your Files Here !*1 - Course Overview1 项
    • 1 - Introduction.mp419.89 MB
  • ~Get Your Files Here !*2 - Building Your Lab Envirorment12 项
    • 1 - Installing Oracle VirtualBox on Windows 10_11.mp434.84 MB
    • 1 - LABINS~1.DOC0.35 MB
    • 2 - Installing the VirtualBox Extension Pack.mp422.03 MB
    • 3 - Creating a Virtaul Install of Kali Linux.mp487.32 MB
    • 3 - LAB-CR~1.PDF0.80 MB
    • 4 - Creating a Virtaul Install of Windows 10.mp457.26 MB
    • 4 - LABINS~1.DOC0.35 MB
    • 5 - Creating a Virtual Install of Metasploitable3 (W2k08).mp451.20 MB
    • 5 - LAB-CR~1.PDF0.64 MB
    • 5 - REACTI~1.TXT0.00 MB
    • 6 - Creating a Virtual install of Server 2016.mp4125.79 MB
    • 6 - LAB-CR~1.PDF0.78 MB
  • ~Get Your Files Here !*3 - Reconnaissance & Scanning15 项
    • 1 - Introduction to Nmap Basics.mp4222.58 MB
    • 1 - Lab - Introduction to Nmap.pdf1.18 MB
    • 2 - Service & OS Detection Using Nmap.mp456.89 MB
    • 3 - Nmap Service and Open Port scan.mp424.81 MB
    • 4 - Nmap Host Detection.mp452.51 MB
    • 5 - Lab - Using the Nmap Scripting Engine (NSE).pdf0.90 MB
    • 5 - Nmap NSE for Windows Services.mp4209.09 MB
    • 6 - Installing OpenVAS Using Docker.mp4133.65 MB
    • 6 - Lab - Installing OpenVAS Using Docker.pdf0.81 MB
    • 7 - Lab - Perform a Vulnerability Scan Using OpenVAS.pdf1.24 MB
    • 7 - Vulnerability Scanning with OpenVAS.mp499.75 MB
    • 8 - LABUSI~1.PDF0.42 MB
    • 8 - Using Shodan to Find Exposed Systems.mp4151.30 MB
    • 9 - Creating A Bash Script For Scanning Vulnerable Ports.mp4214.15 MB
    • 9 - LABB-C~1.PDF0.82 MB
  • ~Get Your Files Here !*4 - Enumeration & Information Gathering10 项
    • 1 - Banner Grabbing & Service Fingerprinting.mp453.17 MB
    • 1 - LAB-US~1.PDF0.51 MB
    • 2 - Lab - Enumerating Windows 10 Using WinPEAS.pdf0.54 MB
    • 2 - Local Enumeration with WinPEAS.mp471.43 MB
    • 3 - Credential Dumping with netsh (Wi-Fi).mp412.54 MB
    • 3 - LAB-DU~1.PDF0.13 MB
    • 4 - LAB-GA~1.PDF1.16 MB
    • 4 - Recon-ng for Windows Infrastructure.mp4143.71 MB
    • 5 - Enumerate DNS Records Us.PDF1.36 MB
    • 5 - Enumerate DNS Records Using DNSRecon.mp485.48 MB
  • ~Get Your Files Here !*5 - Exploitation15 项
    • 1 - Lab - Use Msfvenom to Create a Reverse TCP Payload.pdf0.74 MB
    • 1 - Use Msfvenom to Create a Reverse TCP Payload.mp451.39 MB
    • 2 - Lab - Use Msfvenom to Create an HTTPS Payload.pdf0.75 MB
    • 2 - Use Msfvenom to Create an HTTPS Payload.mp450.95 MB
    • 3 - LAB-US~1.PDF0.59 MB
    • 3 - Use Msfvenom to Create Hidden Bind TCP Payload.mp437.45 MB
    • 4 - Use Msfvenom to Create a BIND Shell Payload.mp459.30 MB
    • 5 - HTML Smuggling Attack.mp480.09 MB
    • 5 - Lab - HTML Smuggling Attack.pdf0.66 MB
    • 6 - Exploiting SQL Injection on Windows Sqlmap.mp4141.08 MB
    • 6 - Lab - SQL Injection Attack using SQLMap.pdf0.41 MB
    • 7 - Exploiting the UNIX_Linux rlogin Vulnerability.mp427.82 MB
    • 8 - Exploiting VSFTPD v2.3.4 Using Metasploit.mp427.01 MB
    • 9 - Lab - Pentesting with Netcat.pdf0.34 MB
    • 9 - Pentesting with Netcat.mp459.09 MB
  • ~Get Your Files Here !*6 - Post-Exploitation & Persistence8 项
    • 1 - LABCRE~1.PDF1.05 MB
    • 1 - Persistent Backdoor Using Service Persistence.mp4116.40 MB
    • 2 - LABCRE~1.PDF0.39 MB
    • 2 - Remote Access via PowerShell Reverse Shell.mp453.34 MB
    • 3 - LAB-LA~1.PDF0.74 MB
    • 3 - Launch an Automated Meterpreter Session.mp470.50 MB
    • 4 - Disable UAC on Windows using PowerShell.mp418.21 MB
    • 4 - LABDIS~1.PDF0.18 MB
  • ~Get Your Files Here !*7 - Privilege Escalation on Windows4 项
    • 1 - Disable UAC on Windows 10 Using Powershell.mp418.21 MB
    • 2 - Verify Windows Privilege Escalation Unquoted Service Path.mp4112.15 MB
    • 3 - LAB-WI~1.PDF0.11 MB
    • 3 - Windows Privilege Escalation - Unquoted Service Path.mp4128.04 MB
  • ~Get Your Files Here !*8 - Credential Attacks14 项
    • 1 - Lab - Using Hydra to Brute Force a Password.docx0.37 MB
    • 1 - Password Cracking with Hydra.mp446.27 MB
    • 2 - Lab – Password Cracking Using Medusa.pdf0.60 MB
    • 2 - Password Cracking with Medusa.mp464.85 MB
    • 3 - Lab - Password Cracking Using Mimikatz.pdf1.07 MB
    • 3 - Password Cracking with Mimikatz.mp4154.71 MB
    • 4 - Lab - Using Hydra to Brute Force a Password.docx0.37 MB
    • 4 - Password Cracking with Hydra.mp446.25 MB
    • 5 - Brute-Forcing Windows Services (RDPSMB).mp499.57 MB
    • 5 - Lab - Performing an RDP Brute Force Attack.pdf0.91 MB
    • 6 - Brute Force the SMB Password.mp488.39 MB
    • 6 - Lab – Brute Force the SMB Password on a Windows Server.pdf0.48 MB
    • 7 - Advanced Password Hacking Techniques with Metasploit.mp480.44 MB
    • 7 - LABADV~1.PDF1.22 MB
  • ~Get Your Files Here !*9 - Wireless & Network Attacks9 项
    • 1 - Lab – Quickly Transfer files Using Python.pdf0.25 MB
    • 1 - Quickly Transfer files Using Python's SimpleHTTPServer.mp444.52 MB
    • 2 - Web Application Firewall Detection Using WAFW00F.mp417.44 MB
    • 3 - Lab - Spoof Fake TCPIP Packets Using Hping3.pdf0.49 MB
    • 3 - Spoof Fake TCP IP Packets Using Hping3.mp453.55 MB
    • 4 - PERFOR~1.PDF0.49 MB
    • 4 - Perform a Vulnerability Scan Using OWASP ZAP Attack Proxy.mp453.80 MB
    • 5 - Exploiting HTTP PUT.mp476.11 MB
    • 5 - Lab - Exploiting HTTP PUT.pdf0.83 MB
  • ~Get Your Files Here !1 项
    • Bonus Resources.txt0.00 MB

截图预览

磁力资源平台 LogoBTSearch

专业的磁力资源搜索引擎

联系邮箱: contact@btsearch.online
© 2026 BTSearch - 磁力资源搜索引擎,Torrent 资源分享平台
免责声明

BTSearch 仅提供磁力链接搜索服务,所有资源均来自第三方网站,本站不存储任何资源文件。请遵守当地法律法规,仅用于学习交流,请勿用于商业用途。如有版权问题,请联系删除。

本站内容仅供学习交流,请在 24 小时内删除下载的内容

尊重版权 · 合法使用