Section 2.zip
382.7 MB
1 - Exploiting WiFi hotspots
2 - WiFi client attacks
3 - Attacking WEP
4 - DoS Attack
5 - WiFi fuzzing for bug discovery
2 - WiFi client attacks
3 - Attacking WEP
4 - DoS Attack
5 - WiFi fuzzing for bug discovery
Section 3.zip
265.5 MB
1 - Attacking WPA2 pre-shared key networks
2 - Attacking WPA2 enterprise networks
3 - Attacking digital enhanced cordless telephony deployments
4 - Attacking zigbee deployments
2 - Attacking WPA2 enterprise networks
3 - Attacking digital enhanced cordless telephony deployments
4 - Attacking zigbee deployments
👍2
Второй курс про разработку малвари от Sector7 - RED TEAM OPERATOR: Malware Development Intermediate
Остальные курсы Sector7 тоже есть на канале:
1. RED TEAM Operator: Malware Development Essentials Course
2. RED TEAM Operator: Windows Persistence
3. RED TEAM Operator: Privilege Escalation in Windows
#course #malware #redteam #pentest
Остальные курсы Sector7 тоже есть на канале:
1. RED TEAM Operator: Malware Development Essentials Course
2. RED TEAM Operator: Windows Persistence
3. RED TEAM Operator: Privilege Escalation in Windows
#course #malware #redteam #pentest
👍5
Section 4.zip
359.5 MB
1 - Bluetooth introduction and attack techniques
2 - Bluetooth low energy introduction and attack techniques
3 - Practical application of software defined radio
2 - Bluetooth low energy introduction and attack techniques
3 - Practical application of software defined radio
Section 5.zip
271.5 MB
1 - RFID
2 - Low frequency RFID attacks
3 - Exploiting RFID contactless smart cards
4 - NFC
2 - Low frequency RFID attacks
3 - Exploiting RFID contactless smart cards
4 - NFC
1. Introduction and Planning of Red Team Exercises.zip
264.9 MB
1. About the Course
2. Defining Terms
3. Motivation and Introduction
4. Frameworks and Methodologies
5. Threat Intelligence
6. Planning
7. Roles and Responsibilities
8. Rules of Engagement
9. Attack Infrastructure
10. Exercise Execution
11. Reconnaissance
12. Social Engineering
13. Weaponization
14. Delivery
2. Defining Terms
3. Motivation and Introduction
4. Frameworks and Methodologies
5. Threat Intelligence
6. Planning
7. Roles and Responsibilities
8. Rules of Engagement
9. Attack Infrastructure
10. Exercise Execution
11. Reconnaissance
12. Social Engineering
13. Weaponization
14. Delivery