CompTIA PenTest+ (PT0-001) 4 Select Your Attacks (II)
CompTIA PenTest+ (PT0-001): 4 Select Your Attacks (II)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 806 MB
Genre: eLearning | Language: English

Download Now

CompTIA PenTest+ (PT0-001) 3 Select Your Attacks
CompTIA PenTest+ (PT0-001): 3 Select Your Attacks
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 753 MB
Genre: eLearning | Language: English

Download Now
Ethical Hacking - Orchestrating Attacks
Ethical Hacking - Orchestrating Attacks
MP4 | Video: h264, 1920x1080 | Audio: AAC, 48 KHz, 2 Ch
Genre: eLearning | Language: English + .SRT
Duration: 1h 13m | 387 MB

Download Now
http://i96.fastpic.ru/big/2018/1030/4e/8fcf6d557e3fde7d7c7d80d8d0ca524e.jpg
How To Beat Anxiety, Depression & Panic Attacks Naturally
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3.5 Hours | Lec: 36 | 944 MB
Genre: eLearning | Language: English
Download Now
ARP Spoofing and Man In The Middle Attacks Execution and Detection
ARP Spoofing and Man In The Middle Attacks: Execution and Detection
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | 473 MB
Genre: eLearning | Language: English


Download Now
Defending Against JavaScript Keylogger Attacks on Payment Card Information
Defending Against javascript Keylogger Attacks on Payment Card Information
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 504 MB
Genre: eLearning | Language: English


Download Now
WMI Attacks and Defense
WMI Attacks and Defense
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch | Duration: 5h 48 | 1.92 GB
Genre: eLearning | Language: English

Download Now
Packt Publishing - Basic and Low-level Python Network Attacks

Packt Publishing - Basic and Low-level Python Network Attacks
English | Size: 1.02 GB
Category: Tutorial

A penetration tester who only knows how to use tools written by others is limited to old techniques. Knowledge of a programming language will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.This course will commence by showing you how to get the Target and Attacker virtual machines running and properly networked together. You will learn how to connect to a server, and how to automate login requests. This will let you break into services by guessing PINs, and exploit blind vulnerabilities by observing time delays.

You will also get your hands dirty and learn how to write custom scanning tools, so that you can send unusual patterns of packets to find and exploit hidden services. Next, you will learn how Web pages are delivered, and how to write your own tools to break into vulnerable websites. Some "blind" services don't return any useful information to guide attackers, but can still be exploited by measuring the time they take to respond.
Download Now
Public Key Cryptography: Applications and Attacks

Lynn Margaret Batten, "Public Key Cryptography: Applications and Attacks"
English | 2013 | ISBN: 1118317122 | 209 pages | EPUB | 2 MB
Download Now
Safe Rooms and Shelters: Protecting People From Terrorist Attacks

Federal Emergency Management Agency (U.S.), "Safe Rooms and Shelters: Protecting People From Terrorist Attacks"
2009 | pages: 264 | ISBN: 0160833698 | PDF | 13,4 mb
Download Now