4. Dynamic Mobile Application Analysis and Manipulation.zip
722.3 MB
1 - Dynamic Mobile Application Analysis and Manipulation
2 - Android Dynamic Anaysis with Drozer
3 - iOS Dynamic Analysis with Needle
4 - Modifying Mobile Applications
5 - Mobile Application Runtime Manipulation
6 - Automated Runtime Manipulation with Objection
7 - Application Security Verification
2 - Android Dynamic Anaysis with Drozer
3 - iOS Dynamic Analysis with Needle
4 - Modifying Mobile Applications
5 - Mobile Application Runtime Manipulation
6 - Automated Runtime Manipulation with Objection
7 - Application Security Verification
5. Mobile Penetration Testing.zip
900.1 MB
1 - Mobile Penetration Testing
2 - Network Activity Analysis
3 - Network Manipulation Attacks
4 - Network Traffic Manipulation
5 - SSL/TLS attacks
6 - Intercepting SSL/TLS traffic
7 - Leveraging Mobile Malware
8 - Where to go from here
2 - Network Activity Analysis
3 - Network Manipulation Attacks
4 - Network Traffic Manipulation
5 - SSL/TLS attacks
6 - Intercepting SSL/TLS traffic
7 - Leveraging Mobile Malware
8 - Where to go from here
1. Foundation of OSINT.zip
514.6 MB
1 - Course Introduction
2 - Understanding OSINT
3 - Goals of OSINT Collection
4 - Diving into the Collecting
5 - Taking Excellent Notes
6 - Determining Your Threat Profile
7 - Setting up an OSINT Platform
8 - Effective Habits and Process
9 - Leveraging Search Engines
2 - Understanding OSINT
3 - Goals of OSINT Collection
4 - Diving into the Collecting
5 - Taking Excellent Notes
6 - Determining Your Threat Profile
7 - Setting up an OSINT Platform
8 - Effective Habits and Process
9 - Leveraging Search Engines
2. Gathering Searching and Analyzing OSINT.zip
684.6 MB
1 - Data Analysis Challenges
2 - Harvesting Web Data
3 - File Metadata Analysis
4 - OSINT Frameworks
5 - Basic Data Addresses and Phone Numbers
6 - Basic Data Email Addresses
7 - User Names
8 - Avatars and Reverse Image Searches
9 - Additional Public Data
10 - Creating Sock Puppets
2 - Harvesting Web Data
3 - File Metadata Analysis
4 - OSINT Frameworks
5 - Basic Data Addresses and Phone Numbers
6 - Basic Data Email Addresses
7 - User Names
8 - Avatars and Reverse Image Searches
9 - Additional Public Data
10 - Creating Sock Puppets
3. Social Media Geolocation and Imagery.zip
673.4 MB
1 - People Search Engines
2 - Facebook Analysis
3 - Linkedin Data
4 - Instagram
5 - Twitter Data
6 - Geolocation
7 - Imagery and Maps
2 - Facebook Analysis
3 - Linkedin Data
4 - Instagram
5 - Twitter Data
6 - Geolocation
7 - Imagery and Maps
4. Networks Government Business.zip
626.6 MB
1 - Whois
2 - IP Address
3 - DNS
4 - Findings Online Devices
5 - Wireless Networks
6 - Recon Tool Suites and Frameworks
7 - Government Data
8 - Researching Companies
2 - IP Address
3 - DNS
4 - Findings Online Devices
5 - Wireless Networks
6 - Recon Tool Suites and Frameworks
7 - Government Data
8 - Researching Companies
5. The Dark Web Breach Data and International Issues.zip
465.8 MB
1 - The Surface Deep and Dark Webs
2 - The Dark Web
3 - Freenet
4 - I2P Invisible Internet Project
5 - Tor
6 - Monitoring and Alerting
7 - International Issues
8 - Vehicle Searches
9 - Putting It All Together
2 - The Dark Web
3 - Freenet
4 - I2P Invisible Internet Project
5 - Tor
6 - Monitoring and Alerting
7 - International Issues
8 - Vehicle Searches
9 - Putting It All Together