Certified White Hat Hacker Level 2(CWHH Level 2)#AnonyCheat# (Size: 590.49 MB)
| | 03_-_Verify_Intranet_Settings_on_VirtualBox.mp4 | 6.03 MB |
| | 01_-_Msfpayload_-_Theory.mp4 | 13.93 MB |
| | 04_-_Metasploit_-_Hacking_into_Intranet_from_using_a_Internet_Facing_machine.mp4 | 14.02 MB |
| | 02_-_MsfPayload_-_DEMO.mp4 | 24.02 MB |
| | 05_-_Metasploit_-_Hacking_into_Intranet_from_using_a_Internet_facing_machine_-_DEMO.mp4 | 61.83 MB |
| | 07_-_Exploiting_Drupal_SQL_Injection_Vulnerability.mp4 | 7.76 MB |
| | 08_-_Exploiting_Windows_XP_machine_using_SMB_Vulnerability.mp4 | 9.72 MB |
| | 12_-_Exploitation_of_Icecast_server_on_Windows_Server.mp4 | 11.44 MB |
| | 14_-_Exploiting_using_D2_Elliot_and_Canvas_PT_Tools.mp4 | 13.66 MB |
| | 09_-_Exploitation_-_Generating_WAR_Trojan_reverse_connecting_for_Tomcat_Server.mp4 | 14.89 MB |
| | 10_-_Local_Privilege_Escalation_on_Windows_7.mp4 | 16.77 MB |
| | 11_-_Exploiting_JBOSS_Server.mp4 | 20.61 MB |
| | 13_-_Remote_Exploitation_-_Hacking_Wordpress_Webportal_and_Rooting_CentOS_server.mp4 | 23.02 MB |
| | 06_-_Hacking_the_Intranet.mp4 | 37.53 MB |
| | 15_-_Xenotix_Presentation.mp4 | 33.93 KB |
| | 16_-_Xenotix_-_Cross_Scripting_Scanner.mp4 | 35.67 MB |
| | 17_-_Ironwasp_Presentation.mp4 | 3.85 MB |
| | 18_-_Ironwasp_Demo.mp4 | 28.85 MB |
| | 19_-_OS_Hardening.mp4 | 9.32 MB |
| | 20_-_OS_hardening_Demo.mp4 | 16.67 MB |
| | 21_-_Log_Analysis.mp4 | 12.65 MB |
| | 22_-_Log_Analysis_DEMO.mp4 | 38.24 MB |
| | Get More Stuff Here !.url | 171 bytes |
| | Important ! Readme.txt | 356 bytes |
| | 25_-_Nmap_and_Nessus_Scripting_-_DEMO.mp4 | 8.84 MB |
| | 24_-_Nmap_and_Nessus_Scripting_-_DEMO.mp4 | 9.99 MB |
| | 23_-_Nmap_and_Nessus_Scripting.mp4 | 14.75 MB |
| | 27_-_Using_VPN_TOR_VPS_All_together_-_To_Hide_Track.mp4 | 7.68 MB |
| | 29_-_Linux_Desktop-_Tor-_Windows_VPS_Hacking_Machine.mp4 | 17.49 MB |
| | 26_-_VPN_-_TOR.mp4 | 19.77 MB |
| | 28_-_VPN-_TOR-_Linux_VPS-_TOR_Using_Nmap_Sqlmap_.mp4 | 24.03 MB |
| | 31_-_Finding_Information_on_Windows_PE_files.mp4 | 3.82 MB |
| | 36_-_Wireshark_-_Malware_Analysis.mp4 | 4.1 MB |
| | 33_-_Process_Hackers.mp4 | 5.08 MB |
| | 34_-_Dependency_Walker.mp4 | 6.68 MB |
| | 32_-_File_Analyser.mp4 | 6.88 MB |
| | 35_-_File_System_and_Registry_Snapshot.mp4 | 7.86 MB |
| | 30_-_Malware_Analysis.mp4 | 24.6 MB |
| | 37_-_Hardware_Hacking.mp4 | 8.42 MB |
Description
Certified White Hat Hacker Level 2 (CWHH Level 2)
Malware analysis, Log analysis, NMAP-Nessus scripts, Metasploit Intranet Hacking, XSS scanner, Automated Web scanner....
Course Description
The course teaches Metasploit advanced hacking into intranet, Malware analysis, nmap-nessus scripts, log analysis, automated web portal analysis, cross scripting exploiter. The course is made for advanced users, penetration testers beginners who would want to learn methods to penetrate intranet, tools needed for malware analysis, Intelligence which needs to be build into log analysis.
What are the requirements?
Virtual box, Kali linux, Windows XP
What am I going to get from this course?
Over 37 lectures and 4 hours of content!
Malware analysis
Automated Web portal scanning
Cross Site Scripting(XSS vuln)
Nmap & Nessus Script
Log Analysis
Intranet Hacking from Internet
Advanced Penetration testing/Ethical Hacking
Anonymous Hacking using TOR-VPN-VPS
What is the target audience?
Network admins, IT Admins, System Admins
IT manager, CISO
College students
Advanced Web app testers
Programmers of web portals
Related Torrents
torrent name |
size |
seed |
leech |
|
565.81 MB |
20 |
16 |
Sharing Widget
All Comments