Удален по просьбе правообладателя
  • Урок 1. 00:04:08
    Understanding Penetration Testing
  • Урок 2. 00:08:26
    Why Do Penetration Tests?
  • Урок 3. 00:04:01
    Types of Pen Tests
  • Урок 4. 00:16:04
    Stage 1: Pre-attack
  • Урок 5. 00:06:38
    Stage 2: Attack
  • Урок 6. 00:01:46
    Stage 3: Post-attack
  • Урок 7. 00:16:50
    Pen Testing Standards
  • Урок 8. 00:03:11
    Summary
  • Урок 9. 00:01:20
    Laying the Foundation
  • Урок 10. 00:06:19
    The Steps to a Successful Pen Test
  • Урок 11. 00:00:52
    Summary
  • Урок 12. 00:01:58
    Intro to Scanning the Target
  • Урок 13. 00:06:05
    Steps to Scan the Target
  • Урок 14. 00:00:51
    Summary
  • Урок 15. 00:01:47
    Intro to Enumerating the Target
  • Урок 16. 00:07:24
    Steps to Enumerate the Target
  • Урок 17. 00:05:12
    Summary
  • Урок 18. 00:03:18
    Intro to Hacking the Target
  • Урок 19. 00:10:06
    Password Cracking
  • Урок 20. 00:02:14
    Privilege Escalation
  • Урок 21. 00:02:09
    Service Accounts
  • Урок 22. 00:03:33
    Hide & Seek Time
  • Урок 23. 00:01:32
    Covering Our Tracks
  • Урок 24. 00:02:28
    Summary
  • Урок 25. 00:01:50
    Intro to Sniffing the Target
  • Урок 26. 00:05:31
    Flooding, Spoofing, & Poisoning
  • Урок 27. 00:01:57
    Summary
  • Урок 28. 00:04:33
    Intro to Social Engineering
  • Урок 29. 00:04:14
    Reconnaissance & Creating the Scenario
  • Урок 30. 00:06:16
    Attacking
  • Урок 31. 00:01:46
    Summary
  • Урок 32. 00:03:09
    Intro to DoS/DDoS the Target
  • Урок 33. 00:00:56
    Outline Objectives
  • Урок 34. 00:02:17
    Load up the Server
  • Урок 35. 00:01:34
    Look for Vulnerabilities & Flooding
  • Урок 36. 00:01:50
    Email-bombing & Flood Web-forms
  • Урок 37. 00:02:42
    Summary
  • Урок 38. 00:02:54
    Intro to Session Hijacking the Target
  • Урок 39. 00:05:31
    Steps to Test for Session Hijacking
  • Урок 40. 00:01:42
    Summary
  • Урок 41. 00:03:26
    Intro to Targeting Web Servers
  • Урок 42. 00:04:12
    Recon Your Targets
  • Урок 43. 00:03:56
    More In-depth Recon
  • Урок 44. 00:01:51
    Summary
  • Урок 45. 00:03:33
    Intro to Hitting the Web Apps
  • Урок 46. 00:03:36
    Define Targets & Gather Information
  • Урок 47. 00:02:11
    Configuration Management Testing
  • Урок 48. 00:02:18
    Authentication Testing
  • Урок 49. 00:01:49
    Session Management Testing
  • Урок 50. 00:01:10
    Authorization Testing
  • Урок 51. 00:03:47
    Data Validation Testing
  • Урок 52. 00:02:24
    Denial of Service Testing
  • Урок 53. 00:03:32
    Web Services Testing
  • Урок 54. 00:02:19
    AJAX Testing
  • Урок 55. 00:03:21
    Summary
  • Урок 56. 00:02:31
    Intro to Looking at the Wi-Fi
  • Урок 57. 00:01:26
    Who's Out There!?
  • Урок 58. 00:01:07
    WEP Testing
  • Урок 59. 00:02:09
    WPA/WPA2 Testing
  • Урок 60. 00:02:08
    General Wi-Fi Testing
  • Урок 61. 00:01:54
    Summary
  • Урок 62. 00:03:16
    Intro to Focusing on the Mobile Devices
  • Урок 63. 00:04:25
    Android Pen Testing
  • Урок 64. 00:03:26
    iPhone Pen Testing
  • Урок 65. 00:02:41
    Windows Phone Pen Testing
  • Урок 66. 00:04:16
    BlackBerry Pen Testing
  • Урок 67. 00:01:56
    Summary
  • Урок 68. 00:02:34
    Intro to Target the Firewall and/or IDS
  • Урок 69. 00:04:03
    Firewall Testing
  • Урок 70. 00:08:49
    IDS Testing
  • Урок 71. 00:01:20
    Summary
  • Урок 72. 00:02:10
    Intro to Going After the Cloud
  • Урок 73. 00:03:30
    It's Not All About You: Before You Begin
  • Урок 74. 00:06:36
    It's Not All About You: The Steps
  • Урок 75. 00:01:29
    Summary
  • Урок 76. 00:01:52
    Intro to How to Bring It All Together
  • Урок 77. 00:08:02
    What's in the Report?
  • Урок 78. 00:02:00
    Summary