Ú©ÛŒÙیت Ùونت مقالات خیلی خوب نیست ولی قابل Ùهم......من دانلود کردم 2 تا عکس میزارم خودتون بهتر ببینید بعد خواستید دانلودکنید
SANS SEC 660 2012
English | PDF | 1.30 GB
SANS SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560 Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a real world lab environment to solidify advanced concepts and allow for the immediate application of techniques in the workplace. Each day includes a two-hour evening bootcamp to allow for additional mastery of the techniques discussed and even more hands-on exercises. A sample of topics covered include weaponizing Python for penetration testers, attacks against network access control (NAC) and VLAN manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as ASLR and DEP, Return Oriented Programming (ROP), Windows exploit-writing, and much more!
Download link:
SANS SEC 660 2012
English | PDF | 1.30 GB
SANS SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking is designed as a logical progression point for those who have completed SANS SEC560 Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a real world lab environment to solidify advanced concepts and allow for the immediate application of techniques in the workplace. Each day includes a two-hour evening bootcamp to allow for additional mastery of the techniques discussed and even more hands-on exercises. A sample of topics covered include weaponizing Python for penetration testers, attacks against network access control (NAC) and VLAN manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as ASLR and DEP, Return Oriented Programming (ROP), Windows exploit-writing, and much more!
Download link:
کد:
Uploaded: http://ul.to/vz0l8osy/SANS.SEC660.2012.part1.rar http://ul.to/5glhk10r/SANS.SEC660.2012.part2.rar http://ul.to/slguaxcp/SANS.SEC660.2012.part3.rar Rapidgator: http://rapidgator.net/file/37476145/SANS.SEC660.2012.part1.rar.html http://rapidgator.net/file/37476226/SANS.SEC660.2012.part2.rar.html http://rapidgator.net/file/37476343/SANS.SEC660.2012.part3.rar.html Extabit: http://extabit.com/file/27b46vr0arx96/SANS.SEC660.2012.part1.rar http://extabit.com/file/27b46vr0a59u2/SANS.SEC660.2012.part2.rar http://extabit.com/file/27b46vr0a59yy/SANS.SEC660.2012.part3.rar Letitbit: http://letitbit.net/download/41216.423b33b36f5abd3daf673de9f2b6/SANS.SEC660.2012.part1.rar.html http://letitbit.net/download/67979.6579ee7f51cfa40f55e49980ce17/SANS.SEC660.2012.part2.rar.html http://letitbit.net/download/63411.6bef1b5f94d01c5cd92eef5f050f/SANS.SEC660.2012.part3.rar.html
Comment