[Tutorial]open security training - videos [By Nexus]

seeders: 1
leechers: 3
Added on February 12, 2013 by nexus66in Other > Tutorials
Torrent verified.



[Tutorial]open security training - videos [By Nexus] (Size: 1.85 GB)
 Metasploit-13-Post Exploitation Pivoting and Port Forwarding.mp465.45 MB
 Metasploit-1-Exploitation Basics and need for Metasploit.mp432.58 MB
 Format-String-Vulnerabilities-Primer-(Part-4-Viewing-the-Stack).mp48.86 MB
 Buffer-Overflow-Primer-Part-3-(Executing-Shellcode).mp412.52 MB
 Scenario-Based-Hacking-Part-2-(No-Patches-No-AV-Behind-NAT).mp429.51 MB
 Assembly-Primer-for-Hackers-(Part-8)-Unconditional-Branching.mp415.47 MB
 Format-String-Vulnerabilities-Primer-(Part-1-The-Basics).mp410.6 MB
 Metasploit-11-Post Exploitation and Stealing Data.mp461.93 MB
 Buffer-Overflow-Primer-Part-8-(Return-to-Libc-Theory).mp413.86 MB
 ASM-Windows-(Part-6)-Macros.mp410.72 MB
 Buffer-Overflow-Primer-Part-2-(Writing-Exit-Shellcode).mp413.98 MB
 Assembly-Primer-for-Hackers-(Part-6)-Working-with-Strings.mp437.92 MB
 Metasploit-10-Post Exploitation Log Deletion and AV Killing.mp487.84 MB
 Metasploit-2-Getting Started with Metasploit.mp463.16 MB
 Metasploit-4-Meterpreter Extensions Stdapi and Priv.mp474.51 MB
 Assembly-Primer-for-Hackers-(Part-10)-Functions.mp413.85 MB
 Metasploit-12-Post Exploitation Backdoors and Rootkits.mp463.68 MB
 Assembly-Primer-for-Hackers-(Part-2)-Virtual-Memory-Organization.mp420.48 MB
 Router Hacking Part 6 (Dictionary Attack using Metasploit on SNMP).mp416.29 MB
 Metasploit-8-Post Exploitation Kung Fu.mp453.14 MB
 ASM-Windows-(Part-5)-Procedures.mp432.19 MB
 Metasploit-3-Meterpreter Basics and using Stdapi.mp4172.28 MB
 Assembly-Primer-for-Hackers-(Part-4)-Hello-World.mp416.92 MB
 Metasploit-7-Espia and Sniffer Extensions with Meterpreter Scripts.mp485.66 MB
 Metasploit-15-Auxiliary Modules.mp440.27 MB
 Assembly-Primer-for-Hackers-(Part-11)-Functions-Stack.mp420.82 MB
 Scenario-Based-Hacking-Part-3-(OS-Patched-No-AV-Behind-NAT).mp442.44 MB
 ASM-Windows-(Part-4)-MASM Data Types.mp430.57 MB
 ASM-Windows-(Part-3)-Win32-ASM-using-MASM32.mp425.28 MB
 Router Hacking Part 3 (Bruteforcing and Dictionary Attacks with Hydra).mp413.9 MB

Description




Open Security Training Videos Collection : http://opensecuritytraining.info/
ENGLISH | 1366x768 | MP4 | 15.00fps 250kbps | aac 44100Hz | 1.85GB
Genre: elearning

Bunch of videos from securitytube.net.
---------------------------------------------
ASM-WIndows-(Part-1)-Processor-Modes.mp4
ASM-WIndows-(Part-2)-Protected-Mode.mp4
ASM-Windows-(Part-3)-Win32-ASM-using-MASM32.mp4
ASM-Windows-(Part-4)-MASM Data Types.mp4
ASM-Windows-(Part-5)-Procedures.mp4
ASM-Windows-(Part-6)-Macros.mp4
ASM-Windows-(Part-7)-Program-Control-using-JMP.mp4
ASM-Windows-(Part-8)-Decision-Directives.mp4
ASM-Windows-(Part-9)-Loops.mp4
Assembly-Primer-for-Hackers-(Part-1)-System-Organization.mp4
Assembly-Primer-for-Hackers-(Part-10)-Functions.mp4
Assembly-Primer-for-Hackers-(Part-11)-Functions-Stack.mp4
Assembly-Primer-for-Hackers-(Part-2)-Virtual-Memory-Organization.mp4
Assembly-Primer-for-Hackers-(Part-3)-GDB-Usage-Primer.mp4
Assembly-Primer-for-Hackers-(Part-4)-Hello-World.mp4
Assembly-Primer-for-Hackers-(Part-5)-Data-Types.mp4
Assembly-Primer-for-Hackers-(Part-6)-Moving-Data.mp4
Assembly-Primer-for-Hackers-(Part-6)-Working-with-Strings.mp4
Assembly-Primer-for-Hackers-(Part-8)-Unconditional-Branching.mp4
Assembly-Primer-for-Hackers-(Part-9)-Conditional-Branching.mp4
Buffer-Overflow-Primer-Part-1-(Smashing the Stack).mp4
Buffer-Overflow-Primer-Part-2-(Writing-Exit-Shellcode).mp4
Buffer-Overflow-Primer-Part-3-(Executing-Shellcode).mp4
Buffer-Overflow-Primer-Part-4-(Shellcode-for-Execve).mp4
Buffer-Overflow-Primer-Part-5-(Shellcode-for-Execve).mp4
Buffer-Overflow-Primer-Part-6-(Exploiting-a-Program).mp4
Buffer-Overflow-Primer-Part-7-(Exploiting-a-Program-Demo).mp4
Buffer-Overflow-Primer-Part-8-(Return-to-Libc-Demo).mp4
Buffer-Overflow-Primer-Part-8-(Return-to-Libc-Theory).mp4
Format-String-Vulnerabilities-Primer-(Part-1-The-Basics).mp4
Format-String-Vulnerabilities-Primer-(Part-2-Crashing-the-Program).mp4
Format-String-Vulnerabilities-Primer-(Part-2-Understanding-Format-Functions).mp4
Format-String-Vulnerabilities-Primer-(Part-4-Viewing-the-Stack).mp4
Metasploit-1-Exploitation Basics and need for Metasploit.mp4
Metasploit-10-Post Exploitation Log Deletion and AV Killing.mp4
Metasploit-11-Post Exploitation and Stealing Data.mp4
Metasploit-12-Post Exploitation Backdoors and Rootkits.mp4
Metasploit-13-Post Exploitation Pivoting and Port Forwarding.mp4
Metasploit-14-Backdooring Executables.mp4
Metasploit-15-Auxiliary Modules.mp4
Metasploit-16-Pass the Hash Attack.mp4
Metasploit-17-Scenario Based Hacking.mp4
Metasploit-2-Getting Started with Metasploit.mp4
Metasploit-3-Meterpreter Basics and using Stdapi.mp4
Metasploit-4-Meterpreter Extensions Stdapi and Priv.mp4
Metasploit-5-Understanding Windows Tokens and Meterpreter Incognito.mp4
Metasploit-6-Espia and Sniffer Extensions with Meterpreter scripts.mp4
Metasploit-7-Espia and Sniffer Extensions with Meterpreter scripts.mp4
Metasploit-8-Post Exploitation Kung Fu.mp4
Metasploit-9-Post Exploitation Privilege Escalation.mp4
Router Hacking Part 1 (The Basics).mp4
Router Hacking Part 2 (Service Enumeration, Fingerprinting and Default Accounts).mp4
Router Hacking Part 3 (Bruteforcing and Dictionary Attacks with Hydra).mp4
Router Hacking Part 4 (SNMP Attacks using SNMPCheck).mp4
Router Hacking Part 5 (SNMP Attacks using SNMPEnum).mp4
Router Hacking Part 6 (Dictionary Attack using Metasploit on SNMP).mp4
Scenario-Based-Hacking-Part-1-(No-Patches-No-AV-Direct-Access).mp4
Scenario-Based-Hacking-Part-2-(No-Patches-No-AV-Behind-NAT).mp4
Scenario-Based-Hacking-Part-3-(OS-Patched-No-AV-Behind-NAT).mp4
Scenario-Based-Hacking-Part-4-(OS-And-Software-Patched-No-AV-Behind-NAT).mp4

Sharing Widget


Download torrent
1.85 GB
seeders:1
leechers:3
[Tutorial]open security training - videos [By Nexus]

Screenshots


[Tutorial]open security training - videos [By Nexus] screenshot