Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
[DesireCourse.Com].url |
51B |
001 Welcome.html |
862B |
002 02-Footprinting-and-Reconnaissance.pdf |
39.46MB |
003 03-Scanning-Networks.pdf |
54.61MB |
004 04-Enumeration.pdf |
15.72MB |
005 05-System-Hacking.pdf |
54.54MB |
006 06-Trojans-and-Backdoors.pdf |
47.73MB |
007 07-Viruses-and-Worms.pdf |
23.73MB |
008 09-Social-Engineering.pdf |
17.07MB |
009 10-Denial-of-Service.pdf |
6.12MB |
010 11-Session-Hijacking.pdf |
6.80MB |
011 12-Hacking-Webservers.pdf |
13.17MB |
012 13-Hacking-Web-Applications.pdf |
12.93MB |
013 14-SQL-Injection.pdf |
18.92MB |
014 15-Hacking-Wireless-Networks.pdf |
12.18MB |
015 18-Buffer-Overflow.pdf |
6.70MB |
016 17-Evading-IDS-Firewalls-and-Honeypots.pdf |
24.05MB |
017 19-Cryptography.pdf |
20.09MB |
018 Introduction.mp4 |
9.88MB |
018 Introduction-en.srt |
8.07KB |
019 Ethical Hacking Penetration Testing.mp4 |
14.72MB |
019 Ethical Hacking Penetration Testing-en.srt |
11.78KB |
020 Kali Linux.mp4 |
22.51MB |
020 Kali Linux-en.srt |
17.59KB |
021 Operating System.mp4 |
8.15MB |
021 Operating System-en.srt |
8.75KB |
022 Operating System Concept.mp4 |
13.45MB |
022 Operating System Concept-en.srt |
11.11KB |
023 Installing kali linux on mac.mp4 |
23.66MB |
023 Installing kali linux on mac-en.srt |
13.34KB |
024 Installing Operating Systems.mp4 |
11.13MB |
024 Installing Operating Systems-en.srt |
12.34KB |
025 Installing Vmware tools.mp4 |
17.88MB |
025 Installing Vmware tools-en.srt |
12.34KB |
026 Configuring Kali Linux.mp4 |
22.56MB |
026 Configuring Kali Linux-en.srt |
12.85KB |
027 What is Footprinting.mp4 |
14.63MB |
027 What is Footprinting-en.srt |
16.56KB |
028 Footprinting Objective.mp4 |
12.33MB |
028 Footprinting Objective-en.srt |
14.52KB |
029 Footprinting tool.mp4 |
29.41MB |
029 Footprinting tool-en.srt |
15.19KB |
030 Introduction to Google Hacking.mp4 |
14.67MB |
030 Introduction to Google Hacking-en.srt |
12.55KB |
031 Nuts and Bolt of Google hacking.mp4 |
14.76MB |
031 Nuts and Bolt of Google hacking-en.srt |
9.67KB |
032 Google Hacking Process.mp4 |
12.65MB |
032 Google Hacking Process-en.srt |
8.51KB |
033 Who is lookup.mp4 |
18.16MB |
033 Who is lookup-en.srt |
13.17KB |
034 DNS Footprinting Overview.mp4 |
13.34MB |
034 DNS Footprinting Overview-en.srt |
9.46KB |
035 DNS Footprinting Function and Process.mp4 |
11.26MB |
035 DNS Footprinting Function and Process-en.srt |
8.68KB |
036 Determining Operating System.mp4 |
16.93MB |
036 Determining Operating System-en.srt |
11.47KB |
037 Introduction to Phishing Attack.mp4 |
15.32MB |
037 Introduction to Phishing Attack-en.srt |
10.70KB |
038 Phishing Attack Details.mp4 |
13.00MB |
038 Phishing Attack Details-en.srt |
7.87KB |
039 Connecting information database.mp4 |
19.56MB |
039 Connecting information database-en.srt |
17.45KB |
040 NMAP.mp4 |
21.47MB |
040 NMAP-en.srt |
9.57KB |
041 zenmap.mp4 |
22.03MB |
041 zenmap-en.srt |
9.01KB |
042 The Harvester Overview.mp4 |
11.09MB |
042 The Harvester Overview-en.srt |
9.12KB |
043 Harvester Process and Function.mp4 |
13.65MB |
043 Harvester Process and Function-en.srt |
7.41KB |
044 WHOIS and dnsnum Overview.mp4 |
19.68MB |
044 WHOIS and dnsnum Overview-en.srt |
10.00KB |
045 DNSenum.mp4 |
14.36MB |
045 DNSenum-en.srt |
9.40KB |
046 URLcrazy.mp4 |
17.67MB |
046 URLcrazy-en.srt |
8.09KB |
047 DNSdict.mp4 |
20.19MB |
047 DNSdict-en.srt |
6.71KB |
048 DNSrecon.mp4 |
21.87MB |
048 DNSrecon-en.srt |
11.17KB |
049 DNSmapping.mp4 |
20.38MB |
049 DNSmapping-en.srt |
14.46KB |
050 Introduction to Social Engineering and Information Gathering.mp4 |
12.19MB |
050 Introduction to Social Engineering and Information Gathering-en.srt |
14.43KB |
051 Types of Social Engineering.mp4 |
8.22MB |
051 Types of Social Engineering-en.srt |
14.89KB |
052 Social Engineering Attacks.mp4 |
10.51MB |
052 Social Engineering Attacks-en.srt |
9.99KB |
053 Spearphishing Attack.mp4 |
22.17MB |
053 Spearphishing Attack-en.srt |
14.74KB |
054 Phishing Attack.mp4 |
15.99MB |
054 Phishing Attack-en.srt |
9.84KB |
055 PhishingAttackConsequences.mp4 |
14.21MB |
055 PhishingAttackConsequences-en.srt |
7.71KB |
056 Massmailer Attack.mp4 |
17.62MB |
056 Massmailer Attack-en.srt |
7.63KB |
057 Introduction to Computer Malwares.mp4 |
10.80MB |
057 Introduction to Computer Malwares-en.srt |
8.57KB |
058 TypesOfComputerMalwares.mp4 |
10.78MB |
058 TypesOfComputerMalwares-en.srt |
11.02KB |
059 DangerousVirusesOfallTime.mp4 |
8.77MB |
059 DangerousVirusesOfallTime-en.srt |
10.20KB |
060 SomeProminentDangerousVirusesOf.mp4 |
10.40MB |
060 SomeProminentDangerousVirusesOf-en.srt |
10.74KB |
061 InstallingRootkitHunter.mp4 |
15.57MB |
061 InstallingRootkitHunter-en.srt |
6.62KB |
062 BackdoorOverview.mp4 |
18.79MB |
062 BackdoorOverview-en.srt |
9.10KB |
063 BackdoorProcessandFunctions.mp4 |
19.38MB |
063 BackdoorProcessandFunctions-en.srt |
8.30KB |
064 BackdoorGainingAccess.mp4 |
22.77MB |
064 BackdoorGainingAccess-en.srt |
8.93KB |
065 BackdoorMaitainingAccess.mp4 |
16.80MB |
065 BackdoorMaitainingAccess-en.srt |
10.03KB |
066 BackdoorMaitainingAccessContinue.mp4 |
13.68MB |
066 BackdoorMaitainingAccessContinue-en.srt |
5.92KB |
067 IntroducingCommandPrompt Backdoor.mp4 |
19.22MB |
067 IntroducingCommandPrompt Backdoor-en.srt |
9.53KB |
068 CommandPromptBackdoorDetail.mp4 |
18.29MB |
068 CommandPromptBackdoorDetail-en.srt |
8.33KB |
069 MeterpreterBackdoor.mp4 |
25.36MB |
069 MeterpreterBackdoor-en.srt |
15.52KB |
070 I am ROOT.mp4 |
33.84MB |
070 I am ROOT-en.srt |
19.14KB |
071 FoensicEscaping.mp4 |
15.50MB |
071 FoensicEscaping-en.srt |
9.45KB |
072 HackingWin7SAMdatabase.mp4 |
32.13MB |
072 HackingWin7SAMdatabase-en.srt |
7.49KB |
073 JackTheRipper.mp4 |
29.32MB |
073 JackTheRipper-en.srt |
14.61KB |
074 Meterpreter Backdoor.mp4 |
26.56MB |
074 Meterpreter Backdoor-en.srt |
16.11KB |
075 PDF Embedded Trojan Horse.mp4 |
25.33MB |
075 PDF Embedded Trojan Horse-en.srt |
12.74KB |
076 Introduction to JAVA applete attack method.mp4 |
11.82MB |
076 Introduction to JAVA applete attack method-en.srt |
8.51KB |
077 Java Applete Attack Method Continue.mp4 |
25.08MB |
077 Java Applete Attack Method Continue-en.srt |
10.61KB |
078 MITM Attack.mp4 |
9.99MB |
078 MITM Attack-en.srt |
13.71KB |
079 ARP Poisoning.mp4 |
11.48MB |
079 ARP Poisoning-en.srt |
16.27KB |
080 DNS Spoofing vs. DNS Posioning.mp4 |
9.45MB |
080 DNS Spoofing vs. DNS Posioning-en.srt |
11.52KB |
081 DNS Spoofing.mp4 |
14.92MB |
081 DNS Spoofing-en.srt |
13.92KB |
082 Advacned concept on DNS Spoofing.mp4 |
20.76MB |
082 Advacned concept on DNS Spoofing-en.srt |
13.49KB |
083 DHCP Spoofing.mp4 |
12.71MB |
083 DHCP Spoofing-en.srt |
18.53KB |
084 Port Stealing.mp4 |
16.19MB |
084 Port Stealing-en.srt |
17.12KB |
085 Introduction to ICMP Redirection.mp4 |
10.42MB |
085 Introduction to ICMP Redirection-en.srt |
15.24KB |
086 ICMP Redirection visual chart.mp4 |
14.03MB |
086 ICMP Redirection visual chart-en.srt |
15.33KB |
087 ICMP Redirection process and function.mp4 |
12.02MB |
087 ICMP Redirection process and function-en.srt |
14.34KB |
088 Killing a network.mp4 |
23.95MB |
088 Killing a network-en.srt |
13.85KB |
089 Ddosing unauthorized Network.mp4 |
17.96MB |
089 Ddosing unauthorized Network-en.srt |
11.50KB |
090 Drifnet.mp4 |
21.61MB |
090 Drifnet-en.srt |
13.69KB |
091 Introducing EvilGrade.mp4 |
17.05MB |
091 Introducing EvilGrade-en.srt |
12.22KB |
092 EvilGrade Continue.mp4 |
15.22MB |
092 EvilGrade Continue-en.srt |
12.89KB |
093 Introduction to Dos.mp4 |
18.38MB |
093 Introduction to Dos-en.srt |
14.52KB |
094 Dos vs. DDos.mp4 |
7.01MB |
094 Dos vs. DDos-en.srt |
10.57KB |
095 Level of DDos Attack.mp4 |
12.53MB |
095 Level of DDos Attack-en.srt |
11.37KB |
096 Preventing DDOS Attacks.mp4 |
13.10MB |
096 Preventing DDOS Attacks-en.srt |
13.43KB |
097 Intoducing DDosing win7.mp4 |
20.44MB |
097 Intoducing DDosing win7-en.srt |
14.42KB |
098 DDosing win7.mp4 |
19.53MB |
098 DDosing win7-en.srt |
13.91KB |
099 Intro to Hacking.mp4 |
11.60MB |
099 Intro to Hacking-en.srt |
8.92KB |
100 Hacking through Android.mp4 |
13.91MB |
100 Hacking through Android-en.srt |
10.39KB |
101 Hacking android via kali linux.mp4 |
23.75MB |
101 Hacking android via kali linux-en.srt |
16.34KB |
102 Password Cracking.mp4 |
17.00MB |
102 Password Cracking-en.srt |
15.94KB |
103 Password Cracking strategy shown in practicals.mp4 |
15.57MB |
103 Password Cracking strategy shown in practicals-en.srt |
14.87KB |
104 Windows password cracking overview.mp4 |
20.46MB |
104 Windows password cracking overview-en.srt |
7.88KB |
105 Nuts and Bolts of windows password cracking strategies.mp4 |
20.08MB |
105 Nuts and Bolts of windows password cracking strategies-en.srt |
4.51KB |
106 Introduction to Linux hash cracking.mp4 |
20.80MB |
106 Introduction to Linux hash cracking-en.srt |
12.97KB |
107 Linux Hash cracking strategies.mp4 |
30.96MB |
107 Linux Hash cracking strategies-en.srt |
16.89KB |
108 Generating word list.mp4 |
17.02MB |
108 Generating word list-en.srt |
10.88KB |
109 Generating word list processes and function.mp4 |
23.83MB |
109 Generating word list processes and function-en.srt |
13.23KB |
110 ceWl Cracking.mp4 |
14.17MB |
110 ceWl Cracking-en.srt |
11.67KB |
111 WEP and WPA.mp4 |
13.11MB |
111 WEP and WPA-en.srt |
13.22KB |
112 WPA Continue.mp4 |
14.60MB |
112 WPA Continue-en.srt |
14.92KB |
113 802.1x standard.mp4 |
10.34MB |
113 802.1x standard-en.srt |
12.07KB |
114 Wireless cracking overview.mp4 |
16.69MB |
114 Wireless cracking overview-en.srt |
13.08KB |
115 Wireless cracking via Kali linux overview.mp4 |
14.35MB |
115 Wireless cracking via Kali linux overview-en.srt |
12.62KB |
116 Meterpreter Overview.mp4 |
33.12MB |
116 Meterpreter Overview-en.srt |
18.56KB |
117 Activating Payload.mp4 |
25.38MB |
117 Activating Payload-en.srt |
13.08KB |
118 MSFConsole Explained.mp4 |
26.41MB |
118 MSFConsole Explained-en.srt |
14.75KB |
119 MSFconsole Command.mp4 |
26.11MB |
119 MSFconsole Command-en.srt |
16.15KB |
120 Exploits.mp4 |
29.51MB |
120 Exploits-en.srt |
13.29KB |
121 Payload.mp4 |
19.45MB |
121 Payload-en.srt |
14.19KB |
122 Generating payloads.mp4 |
34.65MB |
122 Generating payloads-en.srt |
15.27KB |
123 Generating Payload continue.mp4 |
35.05MB |
123 Generating Payload continue-en.srt |
15.87KB |
124 Intro to SQL Injection.mp4 |
7.13MB |
124 Intro to SQL Injection-en.srt |
10.40KB |
125 SQL Mapping via Kali linux.mp4 |
16.68MB |
125 SQL Mapping via Kali linux-en.srt |
13.48KB |
126 Introduction to cryptography.mp4 |
11.42MB |
126 Introduction to cryptography-en.srt |
7.34KB |
127 Basic concept of cryptography.mp4 |
11.47MB |
127 Basic concept of cryptography-en.srt |
9.18KB |
128 Hash function and oracle method.mp4 |
11.88MB |
128 Hash function and oracle method-en.srt |
13.10KB |
129 Birthday theorm and Digitial Signature.mp4 |
13.88MB |
129 Birthday theorm and Digitial Signature-en.srt |
13.38KB |
130 Pros and cons of cryptography.mp4 |
15.74MB |
130 Pros and cons of cryptography-en.srt |
11.27KB |
131 Importing Database.mp4 |
16.26MB |
131 Importing Database-en.srt |
11.72KB |
132 Exporting Database.mp4 |
13.63MB |
132 Exporting Database-en.srt |
9.41KB |
133 Exporting database shown in practical.mp4 |
11.67MB |
133 Exporting database shown in practical-en.srt |
7.04KB |