;
Sold by nicky1086
6 USD / 0.05 XMR
- -‐‐ Penetration Testing: What You Should Know ... 13
- -‐‐ Getting Comfortable with Kali Linux 22
- -‐‐ The Essential Tools ....................... 36
- -‐‐ Passive Information Gathering .. 62
- -‐‐ Active Information Gathering .... 82
- -‐‐ Vulnerability Scanning .............. 119
- -‐‐ Buffer Overflows ... 132
- -‐‐ Win32 Buffer Overflow Exploitation 138
- -‐‐ Linux Buffer Overflow Exploitation 159
- -‐‐ Working with Exploits ............... 171
- -‐‐ File Transfers 181
- -‐‐ Privilege Escalation 192
- -‐‐ Client Side Attacks 200
- -‐‐ Web Application Attacks 214
- -‐‐ Password Attacks 250
- -‐‐ Port Redirection and Tunneling 273
- -‐‐ The Metasploit Framework 287
- -‐‐ Bypassing Antivirus Software 319
- -‐‐ Assembling the Pieces: Penetration Test Breakdown . 327
Created 9 months, 1 week ago
Digital Item
Escrow period 10 days
Available stock 999999