OP 20 April, 2019 - 08:19 PM
(This post was last modified: 20 April, 2019 - 08:20 PM by Pruned4773.)
1. What Is Ethical Hacking And Penetration Testing, And How Can You Use I
2. Introduction From Your Co-Instructor Snehil Khare about Ethical Hacking
3. Environment setup lecture
4. Stealing facebook credentials via phishing
5. How to defend against phishing attacks
6. User Browser hacking using Beef exploitation framework
7. How to defend against browser attacks
8. User machine hacking via word and excel documents
9. Hacking android phones for fun and profit
10. Backdooring android apps for Profi
11. How to defend against android attacks
12. Chaining multiple commands together
13. Download and build the target
14. Hacking with Kali Linux your target system
Size : 354 MB
3. Environment setup lecture
4. Stealing facebook credentials via phishing
5. How to defend against phishing attacks
6. User Browser hacking using Beef exploitation framework
7. How to defend against browser attacks
8. User machine hacking via word and excel documents
9. Hacking android phones for fun and profit
10. Backdooring android apps for Profi
11. How to defend against android attacks
12. Chaining multiple commands together
13. Download and build the target
14. Hacking with Kali Linux your target system
Size : 354 MB