This media is not supported in your browser
VIEW IN TELEGRAM
Section 1.zip
428.4 MB
1 - Introduction
2 - The Wireless threat
3 - Sniffing WiFi
4 - Rogue AP analysis
5 - Bridging the airgap
2 - The Wireless threat
3 - Sniffing WiFi
4 - Rogue AP analysis
5 - Bridging the airgap
Section 2.zip
382.7 MB
1 - Exploiting WiFi hotspots
2 - WiFi client attacks
3 - Attacking WEP
4 - DoS Attack
5 - WiFi fuzzing for bug discovery
2 - WiFi client attacks
3 - Attacking WEP
4 - DoS Attack
5 - WiFi fuzzing for bug discovery
Section 3.zip
265.5 MB
1 - Attacking WPA2 pre-shared key networks
2 - Attacking WPA2 enterprise networks
3 - Attacking digital enhanced cordless telephony deployments
4 - Attacking zigbee deployments
2 - Attacking WPA2 enterprise networks
3 - Attacking digital enhanced cordless telephony deployments
4 - Attacking zigbee deployments
👍2
Второй курс про разработку малвари от Sector7 - RED TEAM OPERATOR: Malware Development Intermediate
Остальные курсы Sector7 тоже есть на канале:
1. RED TEAM Operator: Malware Development Essentials Course
2. RED TEAM Operator: Windows Persistence
3. RED TEAM Operator: Privilege Escalation in Windows
#course #malware #redteam #pentest
Остальные курсы Sector7 тоже есть на канале:
1. RED TEAM Operator: Malware Development Essentials Course
2. RED TEAM Operator: Windows Persistence
3. RED TEAM Operator: Privilege Escalation in Windows
#course #malware #redteam #pentest
👍5
Section 4.zip
359.5 MB
1 - Bluetooth introduction and attack techniques
2 - Bluetooth low energy introduction and attack techniques
3 - Practical application of software defined radio
2 - Bluetooth low energy introduction and attack techniques
3 - Practical application of software defined radio