Videos

Published on August 22nd, 2017 📆 | 2267 Views ⚑

0

Curso de Pentesting Platzi 2017 AGOSTO MEGA


iSpeech


Domina las habilidades necesarias para evaluar la seguridad y vulnerabilidades de sistemas de procesamiento de información: sistemas operativos, aplicaciones, redes, protocolos y más.

Temario del curso
Evaluación de Vulnerabilidad
Webshag
Skipfish
Owasp-zap
Websploit
w3af
MitM Proxy
Host Scanning
Brute Force
Pwdump and Fgdump
Windows Credential Editor
Password Profiling
Password Mutating
Online Password Attacks
Hydra, Medusa, and Ncrack
Password Hash Attacks
Password Hashes
Password Cracking
John the Ripper
Rainbow Tables
Passing the Hash in Windows
Metasploit Database Access
Metasploit Payloads
Meterpreter Payloads
Experimenting with Meterpreter
Reverse HTTPS Meterpreter
Metasploit Exploit Multi Handler
Revisiting Client Side Attacks
Building Your Own MSF Module
Post Exploitation with Metasploit
Cross Site Scripting
Stealing Cookies and Session Information
Browser Redirection and IFRAME Injection
File Inclusion Vulnerabilities
Remote File Inclusion
MySQL SQL Injection
Authentication Bypass
Enumerating the Database
Column Number Enumeration
Understanding the Layout of the Output
Leveraging SQL Injection for Code Execution
Web Application Proxies
Automated SQL Injection Tools

Links Mega
Parte 1: http://ceesty.com/q3qtq1
Parte 2: http://ceesty.com/q3qtMT
Parte 3: http://ceesty.com/q3qy0m
Parte 4: http://ceesty.com/q3qyhI
Parte 5: http://ceesty.com/q3qyUn





Contraseña
bytepl4gue

Llave Mega: !_6DW9V-ktcHhtl4dFN019N7yVGyD2Kcd5YwWXa7giuI


2017-08-22 21:40:01

source

Tagged with:



Comments are closed.