CG数据库 >> ITpro – Metasploit

ITpro – Metasploit的图片1

ITpro - Metasploit

English | mp4 | H264 1280x720 | AAC 2 ch | 11 hrs 58 min | 4.58 GB

These episodes walk you through using Metasploit, the popular penetration testing software. Whether using Windows or Linux, Metasploit can be a powerfull tool to test network security. Learn how to use Metasploit as a part of your security toolkit.

Contents:

01 Metasploit Overview (4m).mp4

02 What is Metasploit (26m).mp4

03 Versions of Metasploit (24m).mp4

04 Metasploit Basics (28m).mp4

05 Exploring the Interface (27m).mp4

06 Exploring the Utilities (15m).mp4

07 Passive Intelligence Gathering (26m).mp4

08 Active Intelligence Gathering (27m).mp4

09 Active Intelligence Gathering Part 2 (25m).mp4

10 Using A Vulnerability Scan (25m).mp4

11 Doing A Vulnerability Scan (29m).mp4

12 Vulnerability Scanners (32m).mp4

13 Vulnerability Scanners Part 2 (23m).mp4

14 Exploits - A Closer Look (20m).mp4

15 Exploits (27m).mp4

16 Exploiting Services (24m).mp4

17 What is Meterpreter (23m).mp4

18 Launching the Meterpreter (26m).mp4

19 Using the Meterpreter (25m).mp4

20 Using the Meterpreter Part 2 (27m).mp4

21 Advanced Meterpreter (15m).mp4

22 Social Engineering (16m).mp4

23 SET Integration (20m).mp4

24 What is Armitage (23m).mp4

25 Configuring Armitage (26m).mp4

26 Armitage Exploits (21m).mp4

27 Armitage Exploits Part 2 (27m).mp4

28 After the Exploit (21m).mp4

29 After the Exploit Part 2 (21m).mp4

30 Pivoting (18m).mp4

31 Advanced Metasploit (25m).mp4

ITpro – Metasploit的图片2

ITpro – Metasploit的图片3

发布日期: 2015-08-27