Download [Packtpub Com] Gaining Access and Covering Your Tracks with Kali Linux - [FCO] GloDLS torrent - GloDLS
Login
Gebruikersnaam:
wachtwoord:
_REMEMBERME_:
[aanmelden]
[Recover Account]
Friends
Angie Torrents
Friendly Site

Get Into Way
Friendly site

Free Courses Online
Friendly site

KaranPC
Friendly site

OneHack
Friendly site

IGGGames
Friendly site

Torrent Details Voor "[Packtpub Com] Gaining Access and Covering Your Tracks with Kali Linux - [FCO] GloDLS"

[Packtpub Com] Gaining Access and Covering Your Tracks with Kali Linux - [FCO] GloDLS

To download this torrent, you need a BitTorrent client: Vuze or BTGuard
Download deze torrent
Download using Magnet Link

Gezondheid:
Seeds: 0
Leechers: 0
Completed:
Laatst gecontroleerd: 27-01-2022 16:37:25

Uploader Reputatie punten : 16676





Write a Review for the Uploader:   235   Say Thanks with one good review:
Share on Facebook


Details
Naam:[Packtpub Com] Gaining Access and Covering Your Tracks with Kali Linux - [FCO] GloDLS
_DESCRIPTION_:


By Sean Oriyano
Released Wednesday, October 31, 2018 New Release!
Course Source: https://www.packtpub.com/business/gaining-access-and-covering-your-tracks-kali-linux-video

Gain access to a system using a portfolio of different techniques

Video Details

ISBN 9781788626354
Course Length 1 hour 48 minutes

Table of Contents

- GAINING REMOTE ACCESS AND COVERING TRACKS
- TUNNELING
- CRACKING PASSWORDS
- REMOVING LOG FILES

Video Description

Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.

This course covers how to gain access to a system using a portfolio of different techniques, each designed to approach the problem from a different angle. Topics covered will be password cracking, NTP, and others. In the second portion of the course you'll be introduced to a group of techniques designed to reduce or eliminate tracks that is left behind as a result of an attack.

In this course we will explore the third and fourth phases of a pentest: exploiting access and covering tracks. This course starts with gaining Remote access using netcat, HTTP tunnels, and executing commands. You will further learn how to crack passwords to gain access to a system using brute-force attacks and rainbow tables.

By the end of this course, you'll have learned how to extract and remove log file information from a system.

Style and Approach

The approach this course adopts is a combination of theory followed by hands-on application of the relevant tool. Each section will focus on a specific tool, its expectations, and goals.

What You Will Learn

- Act upon information about a target
- The types of applications and commands you can run on a remote system
- Learn what type of evidence is left behind after an attack
- Remove or minimize evidence left behind on a targeted system
- Find internal hosts, identify internal services, and locate directory services
- Execute commands with netcat
- Use the http-tunnel and execute commands
- Create and use rainbow tables
- Extract and remove log file information from a system

Authors

Sean Oriyano

Sean Oriyano is a long-time security professional and entrepreneur. Over the past 25 years he has divided his time between performing security research and consulting/delivering training, both in general IT and cybersecurity. In addition, he has become a best-selling author with many years' experience in both digital and print media. Sean has published several books over the last decade and has expanded his reach even further by appearing on shows on both TV and radio. To date, Sean has appeared in over a dozen TV programs and radio shows discussing different cybersecurity topics and technologies. When in front of the camera Sean has been noted for his casual demeanor and praised for his ability to explain complex topics in an easy-to-understand manner. Outside his own business activities, he is a Chief Warrant Officer and commands a unit specializing in cybersecurity, training, development, and strategy. Additionally, as a CWO he is recognized as a SME in his field and is frequently called upon to provide expertise, training and mentoring wherever and whenever needed. When not working, Sean is an avid Obstacle Course Racer having completed numerous races, a world championship race and a Spartan Trifecta. He also enjoys traveling, bodybuilding, MMA, Metroid, and The Legend of Zelda.



YouTube Video:
Categorie:Tutorials
Taal:English  English
Totale grootte:620.93 MB
Info Hash:17B7D9ADD422CDC47875719584A8CBF3FAD02FA4
Toegevoegd door:Prom3th3uS Super AdministratorMovie PirateVIP
Datum toegevoegd:2018-11-05 20:15:50
_TORSTATUS_:Torrent Verified


Ratings:Not Yet Rated (Log in to rate it)


Tracker:
udp://hk1.opentracker.ga:6969/announce

Deze Torrent heeft ook back-trackers
URLZaaimachinesLeechersCompleted
udp://hk1.opentracker.ga:6969/announce000
udp://tw.opentracker.ga:36920/announce000
udp://open.stealth.si:80/announce000
https://seeders-paradise.org:443/announce000
udp://tracker.tiny-vps.com:6969/announce000
udp://hk1.opentracker.ga:6969/announce000
udp://open.stealth.si:80/announce000
https://opentracker.xyz:443/announce000
https://t.quic.ws:443/announce000
https://tracker.fastdownload.xyz:443/announce000
udp://tracker.opentrackr.org:1337/announce000
udp://ipv4.tracker.harry.lu:80/announce000
udp://tracker.coppersurfer.tk:6969/announce000
udp://zephir.monocul.us:6969/announce000
udp://open.demonii.si:1337/announce000


File List: 





Comments
Geen reacties nog geplaatst