最新消息:请大家多多支持

Ethical Hacking: Footprinting and Reconnaissance

其他教程 dsgsd 169浏览 0评论


Ethical Hacking: Footprinting and Reconnaissance
Ethical Hacking: Footprinting and Reconnaissance
MP4 | Video: AVC 1280×720 | Audio: AAC 48KHz 2ch | Duration: 1 Hours 20M | 220 MB
Genre: eLearning | Language: English

If you watched our Introduction to Ethical Hacking course, you know the basics of ethical hacking. Ethical hackers use their knowledge for good: to test if an organization’s network is vulnerable to outside attacks. But where do they start? With footprinting (aka reconnaissance), the process of gathering information about computers and the people to which they belong. In this course, Lisa Bock introduces the concepts, tools, and techniques behind footprinting: finding related websites, determining OS and location information, identifying users through social media and financial services, tracking email, and more. Footprinting relies on tools as simple as a web search and dumpster diving, and as complex as DNS interrogation and traceroute analysis. Lisa shows how to put these nefarious sounding tools to work for good, and mitigate any risks an organization has to these types of attacks.

Ethical Hacking: Footprinting and ReconnaissanceEthical Hacking: Footprinting and Reconnaissance

Download uploaded
http://uploaded.net/file/jrp32lrk/Ethical%20Hacking%20-%20Footprinting%20and%20Reconnaissance.part1.rar
http://uploaded.net/file/pwap4zx8/Ethical%20Hacking%20-%20Footprinting%20and%20Reconnaissance.part2.rar
http://uploaded.net/file/55uk6pvn/Ethical%20Hacking%20-%20Footprinting%20and%20Reconnaissance.part3.rar

Download nitroflare
http://nitroflare.com/view/4FF69A508AA29D0/Ethical_Hacking_-_Footprinting_and_Reconnaissance.part1.rar
http://nitroflare.com/view/1EE05EE99927A29/Ethical_Hacking_-_Footprinting_and_Reconnaissance.part2.rar
http://nitroflare.com/view/FED8008D97D5BD7/Ethical_Hacking_-_Footprinting_and_Reconnaissance.part3.rar

Download 百度云
链接: http://pan.baidu.com/s/1c27EJtA 密码: cd1a

转载请注明:0daytown » Ethical Hacking: Footprinting and Reconnaissance

您必须 登录 才能发表评论!