Para aprender a tecnologia do hacking, você mesmo precisará se tornar um hacker! Software para o curso de "Ethical Hacking and Countermeasures v9" ( « Ethical Hacking e contramedidas", nona edição) fornece as mais recentes ferramentas e métodos de pirataria, que é igualmente usado por ambos os hackers e profissionais de segurança da informação, testando a possibilidade de penetração de computadores nas empresas.
O software do curso abrange 270 tecnologias de ataque, geralmente usadas por hackers. Você será presenteado com maneiras completamente diferentes para garantir a segurança da informação em sua organização, hacking!
Você irá escanear, explorar, hackear e proteger seus sistemas. Po para vários tipos de hacking de sistemas operacionais, aplicativos, sites e também métodos de proteção contra ameaças desse tipo.
Mais de 2200 utilitários hackers frequentemente usados.
Público-alvo
Este software é de considerável interesse para especialistas em segurança de computadores, gerentes de TI, administradores de servidores da Internet e todos os outros profissionais de TI que estão preocupados com a segurança de sua infraestrutura de rede.
Composição do disco
├── CEHv9 Lab Prerequisites.zip
├── CEHv9 o módulo 02 e Reconnaissance.zip Footprinting
├── CEHv9 o Módulo 03 do Networks.zip Scanning
├── CEHv9 o Módulo 04 Enumeration.zip
├── CEHv9 o Módulo 05 Sistema Hacking .zip
├── CEHv9 o Módulo 06 Threats.zip Malware
├── CEHv9 o Módulo 07 Sniffing.zip
├── CEHv9 o Módulo 08 Engineering.zip Lista social
├── CEHv9 o Módulo 09 de Service.zip Denial
├── CEHv9 o Módulo 10 Session Hijacking .zip
├── CEHv9 o Módulo 11 Webservers.zip Hacking
├── CEHv9 o Módulo 12 Applications.zip da web Hacking
├── CEHv9 o Módulo 13 Injection.zip o SQL
├── CEHv9 o Módulo 14 Networks.zip wireless Hacking
├── CEHv9 o Módulo 15 Hacking Mobile Platforms.zip
├── CEHv9 Módulo 16 IDS Evading, Firewalls e Honeypots.zip
└── CEHv9 Módulo 17 Computing.zip Nuvem
CEH_CD_02.ISO
├── CEHv9 módulo 02 e Reconnaissance.zip Footprinting
├── CEHv9 Módulo 04 Enumeration.zip
└── CEHv9 Módulo 05 Hacking.zip o Sistema
CEH_CD_03.ISO
└── CEHv9 Módulo 03 Networks.zip de Digitalização
CEH_CD_04.ISO
├── CEHv9 Módulo 06 Threats.zip Malware
├── CEHv9 Módulo 07 Sniffing.zip
├── CEHv9 Módulo 08 Engenharia social .zip
├── CEHv9 Módulo 09 de Service.zip Denial
└── CEHv9 Módulo 10 Sessão Hijacking.zip
CEH_CD_05.ISO
└── CEHv9 Módulo 11 Webservers.zip Hacking
CEH_CD_06.ISO
└── CEHv9 Módulo 12 Applications.zip da Web Hacking
CEH_CD_07.ISO
├── CEHv9 o Módulo 13 Injection.zip o SQL
└── CEHv9 Módulo 14 Networks.zip Wireless Hacking
CEH_CD_08.ISO
├── CEHv9 o Módulo 15 Platforms.zip Móvel Hacking
├ ── CEHv9 Módulo 16 IDS Evading, firewalls e Honeypots.zip
└── CEHv9 Módulo 18 Cryptography.zip
Certified Ethical Hacker (CEH) v9 Tool Kit (Software & PDF Slides) v9 [2015, ENG]
Magnetc link
Código:
magnet:?xt=urn:btih:F406CFD5C5611EB4AB9C2E0AC9DD0128F8FB1DCD&tr=http%3A%2F%2Fbt2.t-ru.org%2Fann%3Fmagnet&dn=Certified%20Ethical%20Hacker%20(CEH)%20v9%20Tool%20Kit%20(Software%20%26%20PDF%20Slides)%20v9%20%5B2015%2C%20ENG%5D
[CBT Nuggets, Keith Barker] EC Council Certified Ethical Hacker v9.0 [2016, ENG]
1. Welcome (4 min)
2. Building a LAB: Concepts (6 min)
3. Building a LAB: Networking (9 min)
4. Deploy a Kali Linux VM (14 min)
5. Adding Metasploitable to Your Lab (11 min)
6. Adding Windows to Your Lab (14 min)
7. Configure a Static IP on Kali (5 min)
8. Windows Evaluations (7 min)
9. Deploy Windows 8.1 (15 min)
10. Deploy Windows 2012 (11 min)
11. Deploy Windows 10 (7 min)
12. Deploy Windows 2016 (7 min)
13. Ethics and Hacking (10 min)
14. Hacking Vocabulary (6 min)
15. InfoSec Concepts (5 min)
16. Attack Categories, Types, and Vectors (5 min)
17. Five Phases of Hacking (5 min)
18. Footprinting and Reconnaissance Concepts (11 min)
19. Search Engine Tools (8 min)
20. Hacking using Google (12 min)
21. Website Recon Tools (13 min)
22. Metagoofil Metadata Tool (3 min)
23. Email Headers for Footprinting (5 min)
24. Using WHOIS for Recon (4 min)
25. DNS Tools (12 min)
26. Network Scanning Overview (3 min)
27. Network Scanning Methodology (9 min)
28. Port Discovery (11 min)
29. Network Scanning Tools (3 min)
30. Stealth Idle Scanning (10 min)
31. OS and Application Fingerprinting (10 min)
32. Vulnerability Scanning (8 min)
33. Network Mapping Tools (5 min)
34. Proxy Servers (8 min)
35. Using Public Proxy Services (6 min)
36. Enumeration Concepts (5 min)
37. NetBIOS Enumeration (11 min)
38. SNMP Enumeration Concepts (10 min)
39. SNMP Enumeration Tools (10 min)
40. LDAP Enumeration Concepts (5 min)
41. LDAP Enumeration Example (7 min)
42. NTP Enumeration (7 min)
43. SMTP Enumeration (8 min)
44. System Hacking Overview (9 min)
45. Password Cracking Concepts (10 min)
46. Password Attack Example: MITM and Sniffing (13 min)
47. Rainbow Crack Lab Setup (8 min)
48. Rainbow Crack Demonstration (8 min)
49. Password Reset Hacking (8 min)
50. DHCP Starvation (10 min)
51. Remote Access (15 min)
52. Spyware (9 min)
53. NTFS Alternate Data Streams Exploit (9 min)
54. Steganography with OpenPuff (7 min)
55. Steganography with SNOW (5 min)
56. Covering Tracks (7 min)
57. Malware Overview (10 min)
58. Trojan Overview (10 min)
59. Creating a Trojan (11 min)
60. Virus Overview (13 min)
61. Virus Creation (8 min)
62. Detecting Malware (17 min)
63. Malware Analysis (10 min)
64. Hash File Verification (8 min)
65. Sniffing Overview (12 min)
66. CAM Table Attack and Port Security (10 min)
67. DHCP Snooping (14 min)
68. Dynamic ARP Inspection (DAI) (14 min)
69. Social Engineering (15 min)
70. Denial of Service (DoS) Attacks (19 min)
71. Session Hijacking (18 min)
72. Hacking Web Servers (10 min)
73. Buffer Overflow (13 min)
74. OWASP Broken Web Application Project (13 min)
75. Shellshock (6 min)
76. SQL Introduction (9 min)
77. SQL Injection (16 min)
78. Web App Vulnerabilities: WordPress (10 min)
79. Wireless Hacking (18 min)
80. Using an Android VM (4 min)
81. Malware for Mobile (11 min)
82. Mobile Device Risks and Best Practices (13 min)
83. Firewall Evasion (19 min)
84. Firewall ACL Example (15 min)
85. NAT and PAT fundamentals (11 min)
86. IDS/IPS Evasion (17 min)
87. Honeypots (12 min)
88. Cloud Computing (23 min)
89. CIA: Confidentiality, Integrity, and Availability (3 min)
90. Policies (9 min)
91. Quantifying Risk (6 min)
92. Separation of Duties (13 min)
93. Symmetrical Encryption Concepts (14 min)
94. Asymmetrical Encryption Concepts (16 min)
95. Control Types (11 min)
96. Multifactor Authentication (12 min)
97. Centralized Identity Management (13 min)
98. Kerberos and Single Sign On (SSO) (17 min)
99. Backups and Media Management (9 min)
100. Operations Security Controls (14 min)
101. Physical Security Controls (11 min)
102. Incident Response (12 min)
103. VPNs (21 min)
104. Disaster Recovery Planning (13 min)
105. Pen Testing Tips (10 min)
106. Useful Tools (11 min)
107. Case Study (21 min)
108. Additional Resources and Exam Prep (8 min)
Magnetic link
Código:
magnet:?xt=urn:btih:855A174646879D5FA5946ABE3988AC9DBBF8AD8F&tr=http%3A%2F%2Fbt3.t-ru.org%2Fann%3Fmagnet&dn=%5BCBT%20Nuggets%2C%20Keith%20Barker%5D%20EC%20Council%20Certified%20Ethical%20Hacker%20v9.0%20%5B2016%2C%20ENG%5D
Comment