Tag: Hacking

Ethical Hacking Session Hijacking


Updated: May 15, 2023
Duration: 1h 17m | .MP4 1280×720, 30 fps(r) | AAC, 48000 Hz, 2ch | 196 MB
Level: Beginner + Intermediate | Genre: eLearning | Language: English
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions-the valid interactions of unsuspecting users-in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test their systems for exposure.

(more…)

Ethical Hacking Recon and the Dark Web

Omar Santos, Joseph Mlodzianowski | Duration: 7:22 h | Video: H264 1280×720 | Audio: AAC 48 kHz 2ch | 2,55 GB | Language: English
This live and interactive training is designed to help you perform passive and active reconnaissance in ethical hacking and bug bounty hunting engagements. You will learn intermediate-to-advanced recon methodologies using open source intelligence (OSINT). In this training you will also learn how to perform dark web research and reconnaissance. You will learn how to use Tor, proxies and proxychains, and even how to create your own VPN servers in cloud environments.
What you’ll learn

(more…)

Ethical Hacking Cloud Computing (2023)


Released 4/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 2h 30m | Size: 345 MB
Cloud resource hardening and monitoring can go a long way in mitigating cloud-based attacks. In this course, which maps to the Cloud Computing module from the Certified Ethical Hacker (CEH) Body of Knowledge, instructor Daniel Lachance explores how many types of resources including virtual machines, databases, and storage can be deployed in a cloud computing environment. Daniel covers how cloud computing relates to the different phases of ethical hacking, as well as common breaches and security threats that can affect overall cloud security. He also goes over cloud identity management, keeping your IT systems running in the cloud even in the event of an attack or security breach, using artificial intelligence (AI) and machine learning (ML) to identify anomalies that might indicate that your system is compromised, test-taking strategies, and much more.

(more…)

Ethical Hacking Sniffers (2023)


Released 4/2023
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill Level: Intermediate | Genre: eLearning | Language: English + srt | Duration: 2h 8m | Size: 307 MB
Ethical hacking involves testing to see if an organization’s network is vulnerable to outside attacks. It’s one of the most desired stills for any IT security professional. In this course-which maps to the Certified Ethical Hacker v12 certification-Lisa Bock provides an overview of what a sniffer is, and how hackers use it to intercept network traffic. Lisa gives a demonstration of what a MAC attack is, and how ethical hackers can prevent them. She then dives into DHCP, ARP, and DNS, and how hackers can penetrate a network from these services, before showing ethical hackers how to countermeasure such attacks. Lisa concludes the course with an overview of the various sniffing tools and techniques used today by hackers, with discussion of how ethical hackers can protect their network.

(more…)