Cargando…

Learn hacking Windows 10 using Metasploit from scratch.

Practice what you have learned to become a pro because this course focuses on both the practical and theoretical sides. About This Video Secure Windows 10/8.1/8/7/Vista like white hat hackers Capture the keystrokes of the compromised system Learn the theory behind getting a reverse connection over t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, [2022]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1315582038
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 220510s2022 xx 630 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
020 |a 9781803241920  |q (electronic video) 
020 |a 1803241926  |q (electronic video) 
029 1 |a AU@  |b 000072007019 
035 |a (OCoLC)1315582038 
037 |a 9781803241920  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20220510 
049 |a UAMI 
245 0 0 |a Learn hacking Windows 10 using Metasploit from scratch. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c [2022] 
300 |a 1 online resource (1 video file (10 hr., 30 min.)) :  |b sound, color. 
306 |a 103000 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Saad Sarraj, presenter. 
500 |a "Updated in April 2022." 
520 |a Practice what you have learned to become a pro because this course focuses on both the practical and theoretical sides. About This Video Secure Windows 10/8.1/8/7/Vista like white hat hackers Capture the keystrokes of the compromised system Learn the theory behind getting a reverse connection over the WAN network In Detail In this course, you will learn how black hat hackers hack Windows OS using advanced techniques. In addition to this, you will learn how white hat hackers secure Windows OS by analyzing the malicious files and detecting the hacker's identity. You will start with downloading and setting up the latest version of Kali Linux as a virtual machine or as your main OS properly. Post which, you will learn how to gather as much information as possible about your target. This helps you identify and determine your target and see the weaknesses in the target OS. After that, you will learn how to create basic and encoded payloads using the msfvenom tool. Furthermore, you will start learning advanced techniques to create an encoded payload that's undetectable by most antiviruses. You will also learn how to run post-exploitation modules on the compromised system. Moving ahead, you will learn what the BeEF Project is and how to hook any user to your BeEF control panel. You will even be able to perform sophisticated attacks to gain full access to the target OS using BeEF. Finally, it's time to learn how to detect all the attacks that we learned. In this section, you will learn how to protect your Windows OS from all the explained attacks, and how to detect any backdoor and check whether it's embedded with an image, EXE, or PDF file. By the end of the course, you will learn how white hat hackers secure Windows OS by analyzing the malicious files and detecting the hacker's identity. Audience This course is intended for anyone who wants to become an ethical hacker/penetration tester and for anyone who wants to learn how black hat hackers hack the operating systems and how white hat hackers secure the operating systems. If you are a beginner, you will start from zero until you become an expert. If you are a professional, this course will increase your knowledge about hacking. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed May 10, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 6 |a Tests d'intrusion. 
650 7 |a Penetration testing (Computer security)  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Sarraj, Saad,  |e presenter. 
710 2 |a Packt Publishing,  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781803241920/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP