Section 2.zip
382.7 MB
1 - Exploiting WiFi hotspots
2 - WiFi client attacks
3 - Attacking WEP
4 - DoS Attack
5 - WiFi fuzzing for bug discovery
2 - WiFi client attacks
3 - Attacking WEP
4 - DoS Attack
5 - WiFi fuzzing for bug discovery
Section 3.zip
265.5 MB
1 - Attacking WPA2 pre-shared key networks
2 - Attacking WPA2 enterprise networks
3 - Attacking digital enhanced cordless telephony deployments
4 - Attacking zigbee deployments
2 - Attacking WPA2 enterprise networks
3 - Attacking digital enhanced cordless telephony deployments
4 - Attacking zigbee deployments
👍2
Второй курс про разработку малвари от Sector7 - RED TEAM OPERATOR: Malware Development Intermediate
Остальные курсы Sector7 тоже есть на канале:
1. RED TEAM Operator: Malware Development Essentials Course
2. RED TEAM Operator: Windows Persistence
3. RED TEAM Operator: Privilege Escalation in Windows
#course #malware #redteam #pentest
Остальные курсы Sector7 тоже есть на канале:
1. RED TEAM Operator: Malware Development Essentials Course
2. RED TEAM Operator: Windows Persistence
3. RED TEAM Operator: Privilege Escalation in Windows
#course #malware #redteam #pentest
👍5
Section 4.zip
359.5 MB
1 - Bluetooth introduction and attack techniques
2 - Bluetooth low energy introduction and attack techniques
3 - Practical application of software defined radio
2 - Bluetooth low energy introduction and attack techniques
3 - Practical application of software defined radio
Section 5.zip
271.5 MB
1 - RFID
2 - Low frequency RFID attacks
3 - Exploiting RFID contactless smart cards
4 - NFC
2 - Low frequency RFID attacks
3 - Exploiting RFID contactless smart cards
4 - NFC