Jump to content

Uranus

Members
  • Posts

    7
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Uranus's Achievements

Enthusiast

Enthusiast (6/14)

  • One Year In
  • One Month Later
  • Very Popular Rare
  • Week One Done
  • Conversation Starter

Recent Badges

652

Reputation

  1. Last updated 7/2022 MP4 | Eng | 1.65 GB [Hidden Content] [Hidden Content] [Hidden Content] What you'll learn 45 Real World Ethical Hacking Videos Start from ground up to the Sky Latest & Newest Methods in Real World Ethical Hacking Learn Latest Tools for Real World Ethical Hacking Understand What Happened in Ethical Hacking Process Modern Case Studies and Current Events MITRE ATT&CK Framework DeTT&CT Framework Atomic Purple Team Threat Hunting (Tahiti) MITRE D3FEND Framework MITRE RE&CT MITRE Engage Framework MITRE ENGENUITY Framework MITRE Cyber Analytics Repository (CAR) Framework Search Engines for OSINT Whois Reverse Whois Dark Web OSINT Search Engine Clustering DNS OSINT Wireless OSINT Email OSINT Recon-ng For OSINT People OSINT Spiderfoot for OSINT Image OSINT OCR for OSINT Sock Puppet Social Networks OSINT Maltego Maltego Website Analysis Maltego Footprint Machines Documentation CDP Recon ARP Spoofing Attack CAM Table OverFlow Attack Switch Spoofing Attack Double Tagging Attack STP Attack Cisco Password Attacks (Type 5 & Type 7) DHCP Starvation Attack HSRP Attack Syslog Spoofing Attack Syslog DDoS Attack DNS Spoofing Attack DNS Amplification Attack Discover Live Hosts in Restricted Networks Learn Metasploit Framework Server-Side Exploitation Attack Client-Side Exploitation Attack Bypass User Access Control Remote Sniffing Attack Host-Based DNS Poisoning Attack Requirements Basic Networking Knowledge
  2. Published 07/2022 MP4 | Eng | 2.29 GB [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] What you'll learn How to hack a Computer System You will learn How different tools and techniques work in real world Ethical Hacking with Kali You will learn about System Security Hands-on Experience
  3. Published 07/2022 MP4 | Eng | 331.9 MB [Hidden Content] What you'll learn Manual Scanning Scanning website for hidden directories Scanning website for hidden files Scanning for hidden subdomains Scanning WordPress blogs Scanning Servers
  4. Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks Published: June 2022 [Hidden Content]
  5. PDF - 82 MB SANS really put on a virtual summit this year for the DFIR community. One of the most fun things are the posters showned below. You can also get these directly from SANS: A Visual Summary of SANS DFIR Summit 2021. These were drawn LIVE by Aston Rodenhiser who has done some amazing work. I am just going to leave these here for the summary of the conference because they are great. Link : [Hidden Content]
  6. PDF - 12MB Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the seventh edition includes expanded coverage of security evaluations, embedded device and Internet of Things (IoT) security, and cloud and virtualization security. Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice, while the innovative Information Security Community Site connects you to up-to-the-minute news and insights from the information security field. Link [Hidden Content]
  7. PDF - 10MB When you are developing and deploying applications in the cloud, it's easy to get too much focused on the end result due requirements of the speed and agility. However, it is important to keep in mind that creating technology solution's is a lot like constructing a physical building. If the foundation isn't solid, it may cause structural problems and undermine the integrity and function of that building. Starting from the initial design phase to the recurring review of your workload, it is important to ensure that your architecture is in accordance with the best practices. This ensures that your workload environment continues to function and deliver results, the way it is supposed to do in the short as well as long run. [Hidden Content]
×
×
  • Create New...