Ralf Hacker Channel
28.3K subscribers
469 photos
17 videos
503 files
595 links
Пул тегов:
https://t.me/RalfHackerChannel/297

Админ: @hackerralf8
Download Telegram
SEC 487.3 (2020): OSINT. pt 3

#osint #recon #course #sans
3. Social Media Geolocation and Imagery.zip
673.4 MB
1 - People Search Engines
2 - Facebook Analysis
3 - Linkedin Data
4 - Instagram
5 - Twitter Data
6 - Geolocation
7 - Imagery and Maps
SEC 487.4 (2020): OSINT. pt 4

#osint #recon #course #sans
4. Networks Government Business.zip
626.6 MB
1 - Whois
2 - IP Address
3 - DNS
4 - Findings Online Devices
5 - Wireless Networks
6 - Recon Tool Suites and Frameworks
7 - Government Data
8 - Researching Companies
SEC 487.5 (2020): OSINT. pt 5

#osint #recon #course #sans
5. The Dark Web Breach Data and International Issues.zip
465.8 MB
1 - The Surface Deep and Dark Webs
2 - The Dark Web
3 - Freenet
4 - I2P Invisible Internet Project
5 - Tor
6 - Monitoring and Alerting
7 - International Issues
8 - Vehicle Searches
9 - Putting It All Together
SEC 642.1 (2020): Advanced Web App Testing, Ethical Hacking, and Exploitation Techniques. pt 1

#sans #cource #web
Section1 - Advanced Attacks.zip
582.7 MB
1 - Introduction
2 - Methodology and Context
3 - File Inclusion
4 - SQL Injection
5 - NoSQL Injection
6 - XSS and XSRF Together
SEC 642.2 (2020): Advanced Web App Testing, Ethical Hacking, and Exploitation Techniques. pt 2

#sans #cource #web
Section2 - Web Frameworks.zip
442.3 MB
1 - Introduction
2 - Content Management Systems
3 - Web Architectures
4 - Languages and Frameworks
SEC 642.3 (2020): Advanced Web App Testing, Ethical Hacking, and Exploitation Techniques. pt 3

#sans #cource #web
Section3 - Web Cryptography.zip
471.3 MB
1 - Introduction to Web Cryptography
2 - Basic Crypto Concepts
3 - Ciphers and Ciphers Modes
4 - Identifying Crypto
5 - Crypto Exploit Concepts
6 - Attacking Encryption Keys
7 - Attacking Stream Ciphers
8 - Attacking ECB Cipher Mode
9 - Attacking CBC Cipher Mode
10 - Attacking PKCS#7
SEC 642.4 (2020): Advanced Web App Testing, Ethical Hacking, and Exploitation Techniques. pt 4

#sans #cource #web
Section4 - Alternative Web Interfaces.zip
419.5 MB
1 - Introduction
2 - Hash Length Extensions Attacks
3 - Alternative Web Interfaces
4 - Mobile Applications
5 - Compiled Objects
6 - Web Services
7 - WebSockets
8 - HTTP2