Удален по просьбе правообладателя
  1. Урок 1. 00:04:08
    Understanding Penetration Testing
  2. Урок 2. 00:08:26
    Why Do Penetration Tests?
  3. Урок 3. 00:04:01
    Types of Pen Tests
  4. Урок 4. 00:16:04
    Stage 1: Pre-attack
  5. Урок 5. 00:06:38
    Stage 2: Attack
  6. Урок 6. 00:01:46
    Stage 3: Post-attack
  7. Урок 7. 00:16:50
    Pen Testing Standards
  8. Урок 8. 00:03:11
    Summary
  9. Урок 9. 00:01:20
    Laying the Foundation
  10. Урок 10. 00:06:19
    The Steps to a Successful Pen Test
  11. Урок 11. 00:00:52
    Summary
  12. Урок 12. 00:01:58
    Intro to Scanning the Target
  13. Урок 13. 00:06:05
    Steps to Scan the Target
  14. Урок 14. 00:00:51
    Summary
  15. Урок 15. 00:01:47
    Intro to Enumerating the Target
  16. Урок 16. 00:07:24
    Steps to Enumerate the Target
  17. Урок 17. 00:05:12
    Summary
  18. Урок 18. 00:03:18
    Intro to Hacking the Target
  19. Урок 19. 00:10:06
    Password Cracking
  20. Урок 20. 00:02:14
    Privilege Escalation
  21. Урок 21. 00:02:09
    Service Accounts
  22. Урок 22. 00:03:33
    Hide & Seek Time
  23. Урок 23. 00:01:32
    Covering Our Tracks
  24. Урок 24. 00:02:28
    Summary
  25. Урок 25. 00:01:50
    Intro to Sniffing the Target
  26. Урок 26. 00:05:31
    Flooding, Spoofing, & Poisoning
  27. Урок 27. 00:01:57
    Summary
  28. Урок 28. 00:04:33
    Intro to Social Engineering
  29. Урок 29. 00:04:14
    Reconnaissance & Creating the Scenario
  30. Урок 30. 00:06:16
    Attacking
  31. Урок 31. 00:01:46
    Summary
  32. Урок 32. 00:03:09
    Intro to DoS/DDoS the Target
  33. Урок 33. 00:00:56
    Outline Objectives
  34. Урок 34. 00:02:17
    Load up the Server
  35. Урок 35. 00:01:34
    Look for Vulnerabilities & Flooding
  36. Урок 36. 00:01:50
    Email-bombing & Flood Web-forms
  37. Урок 37. 00:02:42
    Summary
  38. Урок 38. 00:02:54
    Intro to Session Hijacking the Target
  39. Урок 39. 00:05:31
    Steps to Test for Session Hijacking
  40. Урок 40. 00:01:42
    Summary
  41. Урок 41. 00:03:26
    Intro to Targeting Web Servers
  42. Урок 42. 00:04:12
    Recon Your Targets
  43. Урок 43. 00:03:56
    More In-depth Recon
  44. Урок 44. 00:01:51
    Summary
  45. Урок 45. 00:03:33
    Intro to Hitting the Web Apps
  46. Урок 46. 00:03:36
    Define Targets & Gather Information
  47. Урок 47. 00:02:11
    Configuration Management Testing
  48. Урок 48. 00:02:18
    Authentication Testing
  49. Урок 49. 00:01:49
    Session Management Testing
  50. Урок 50. 00:01:10
    Authorization Testing
  51. Урок 51. 00:03:47
    Data Validation Testing
  52. Урок 52. 00:02:24
    Denial of Service Testing
  53. Урок 53. 00:03:32
    Web Services Testing
  54. Урок 54. 00:02:19
    AJAX Testing
  55. Урок 55. 00:03:21
    Summary
  56. Урок 56. 00:02:31
    Intro to Looking at the Wi-Fi
  57. Урок 57. 00:01:26
    Who's Out There!?
  58. Урок 58. 00:01:07
    WEP Testing
  59. Урок 59. 00:02:09
    WPA/WPA2 Testing
  60. Урок 60. 00:02:08
    General Wi-Fi Testing
  61. Урок 61. 00:01:54
    Summary
  62. Урок 62. 00:03:16
    Intro to Focusing on the Mobile Devices
  63. Урок 63. 00:04:25
    Android Pen Testing
  64. Урок 64. 00:03:26
    iPhone Pen Testing
  65. Урок 65. 00:02:41
    Windows Phone Pen Testing
  66. Урок 66. 00:04:16
    BlackBerry Pen Testing
  67. Урок 67. 00:01:56
    Summary
  68. Урок 68. 00:02:34
    Intro to Target the Firewall and/or IDS
  69. Урок 69. 00:04:03
    Firewall Testing
  70. Урок 70. 00:08:49
    IDS Testing
  71. Урок 71. 00:01:20
    Summary
  72. Урок 72. 00:02:10
    Intro to Going After the Cloud
  73. Урок 73. 00:03:30
    It's Not All About You: Before You Begin
  74. Урок 74. 00:06:36
    It's Not All About You: The Steps
  75. Урок 75. 00:01:29
    Summary
  76. Урок 76. 00:01:52
    Intro to How to Bring It All Together
  77. Урок 77. 00:08:02
    What's in the Report?
  78. Урок 78. 00:02:00
    Summary