UDEMY HACKING WIRELESS NETWORKS THEORY AND PRACTICE TUTORIAL

Torrent letöltése
Méret: 787.39 MB 
Seederek: 39
Leecherek: 6
Hozzáadva: 2017-10-28 11:54:54
Kategória: Other > Other
UDEMY HACKING WIRELESS NETWORKS THEORY AND PRACTICE TUTORIAL.torrent:
01_-_Download_your_Training_Operating_System_v2.0_CE/01_-_Download_the_TOS_v2.0_CE_CUDA_Extension_ISO_image.txt3.1 KiB
02_-_Download_the_whole_course_Handbook/02_-_Download_the_course_Handbook_in_PDF.txt133 B
04_-_Introduction_to_wireless_networks/10_-_Wireless_network_interface_cards_in_Linux.mp48.03 MiB
05_-_Wireless_security_half_measures_-_An_overview/12_-_Changing_the_MAC_address_of_the_wireless_network_card.mp416.31 MiB
05_-_Wireless_security_half_measures_-_An_overview/14_-_Finding_a_hidden_access_point_with_disabled_ESSID_broadcast.mp415.37 MiB
06_-_Wireless_network_attacks_independent_of_used_encryption/19_-_The_use_of_deauthentication_attack_for_jamming_network_traffic.mp414.56 MiB
07_-_WEP_attacks/28_-_Interactive_packet_replay_and_ARP_request_replay.mp420.11 MiB
07_-_WEP_attacks/27_-_Generating_packets_without_knowing_the_network_key.mp414.09 MiB
07_-_WEP_attacks/25_-_The_overview_and_demonstration_of_the_chop-chop_attack.mp413.77 MiB
07_-_WEP_attacks/29_-_The_demonstration_of_the_PTW_and_KoreK_attacks.mp412 MiB
07_-_WEP_attacks/31_-_Creating_a_fake_access_point_the_Caffe_Latte_attack.mp49.91 MiB
08_-_WPA_attacks/34_-_The_dictionary_attack_on_WPA.mp412.34 MiB
08_-_WPA_attacks/37_-_The_dictionary_attack_on_WPA_using_hash_tables.mp48.91 MiB
09_-_CUDA-powered_attacks/46_-_CUDA_the_attack_on_WPA.mp435.56 MiB
09_-_CUDA-powered_attacks/43_-_The_compilation_and_installation_of_the_tools_with_CUDA_support.mp428.41 MiB
09_-_CUDA-powered_attacks/48_-_Applications_for_cracking_MD4_and_MD5_hashes_with_the_use_of_CUDA_technology.mp420.73 MiB
09_-_CUDA-powered_attacks/44_-_The_optimization_of_the_parameters_of_an_nVidia_video_card.mp419.45 MiB
09_-_CUDA-powered_attacks/42_-_The_installation_of_CUDA-SDK_and_CUDA-Toolkit.mp414.63 MiB
09_-_CUDA-powered_attacks/45_-_CUDA_preparation_for_the_attack.mp49.44 MiB
09_-_CUDA-powered_attacks/47_-_Generating_your_own_dictionary.mp49.01 MiB
09_-_CUDA-powered_attacks/41_-_CUDA_the_initial_preparation_of_the_environment.mp47.22 MiB
13_-_Free_additions/58_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_Monitoring_Transmitted_Data.mp4261.49 MiB
13_-_Free_additions/60_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_WiFi_Security_-_Overview_and_sol....mp4137.09 MiB
13_-_Free_additions/61_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_WiFi_Security_-_Threats.mp489.59 MiB
13_-_Free_additions/57_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_Monitoring_-_What_you_will_learn.mp44.85 MiB
13_-_Free_additions/59_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_WiFi_Security_-_What_you_will_learn.mp44.52 MiB
13_-_Free_additions/62_-_Website_Hacking_in_Practice_Course_-_Module_13._SQL_injection_-_Video_Training.mp4243 B