Ralf Hacker Channel – Telegram
Ralf Hacker Channel
28.3K subscribers
466 photos
16 videos
503 files
590 links
Download Telegram
Section 2.zip
382.7 MB
1 - Exploiting WiFi hotspots
2 - WiFi client attacks
3 - Attacking WEP
4 - DoS Attack
5 - WiFi fuzzing for bug discovery
SEC 617.3 (2020) - Wireless penetration testing and ethical hacking pt3

#sans #cource #wifi #wireless
Please open Telegram to view this post
VIEW IN TELEGRAM
Section 3.zip
265.5 MB
1 - Attacking WPA2 pre-shared key networks
2 - Attacking WPA2 enterprise networks
3 - Attacking digital enhanced cordless telephony deployments
4 - Attacking zigbee deployments
👍2
Второй курс про разработку малвари от Sector7 - RED TEAM OPERATOR: Malware Development Intermediate

Остальные курсы Sector7 тоже есть на канале:
1. RED TEAM Operator: Malware Development Essentials Course
2. RED TEAM Operator: Windows Persistence
3. RED TEAM Operator: Privilege Escalation in Windows

#course #malware #redteam #pentest
👍5
SEC 617.4 (2020) - Wireless penetration testing and ethical hacking pt4

#sans #cource #wireless
Please open Telegram to view this post
VIEW IN TELEGRAM
Section 4.zip
359.5 MB
1 - Bluetooth introduction and attack techniques
2 - Bluetooth low energy introduction and attack techniques
3 - Practical application of software defined radio
Отчет: MOLERATS IN THE CLOUD: New Malware Arsenal Abuses Cloud Platforms in Middle East Espionage Campaign

#malware #report
AMNESIA33

#report
SEC 617.5 (2020) - Wireless penetration testing and ethical hacking pt5

#sans #cource #wifi #wireless
Please open Telegram to view this post
VIEW IN TELEGRAM
Section 5.zip
271.5 MB
1 - RFID
2 - Low frequency RFID attacks
3 - Exploiting RFID contactless smart cards
4 - NFC
Please open Telegram to view this post
VIEW IN TELEGRAM
SEC 564.1 (2020) - Introduction and Planning of Red Team Exercises

#pentest #redteam #cource #sans
1. Introduction and Planning of Red Team Exercises.zip
264.9 MB
1. About the Course
2. Defining Terms
3. Motivation and Introduction
4. Frameworks and Methodologies
5. Threat Intelligence
6. Planning
7. Roles and Responsibilities
8. Rules of Engagement
9. Attack Infrastructure
10. Exercise Execution
11. Reconnaissance
12. Social Engineering
13. Weaponization
14. Delivery