OSCP课程
OSCP/
├──INE机构OSCP课程
| ├──01 Overview
| | └──01 Course Introduction.mp420.77M
| ├──02 Introduction to Kali Linux
| | ├──2-01 Installing Kali Linux.mp420.96M
| | ├──2-02 Command Line Refresher.mp461.35M
| | ├──2-03 Kali Linux Services.mp422.56M
| | └──2-04 Bash Scripting in Kali Linux.mp450.77M
| ├──03 Information Gathering
| | └──3-01 Information Gathering.mp467.36M
| ├──04 Scanning
| | ├──4-01 TCP VS UDP.mp411.36M
| | ├──4-02 Scanning with Nmap.mp4191.68M
| | ├──4-03 Scanning with Nessus.mp415.21M
| | └──4-04 Scanning with Metasploit.mp474.25M
| ├──05 Enumeration
| | ├──5-01 Installing Kioptrix Level 1.mp411.84M
| | ├──5-02 SSH Enumeration.mp474.42M
| | ├──5-03 HTTP Enumeration.mp4115.76M
| | ├──5-04 SMB Enumeration.mp4141.90M
| | ├──5-05 DNS Enumeration.mp451.86M
| | └──5-06 Other Enumeration.mp44.61M
| ├──06 Netcat
| | └──6-01 Introduction to Netcat.mp413.92M
| ├──07 Buffer Overflows
| | ├──7-01 Introduction to Buffer Overflows.mp47.44M
| | ├──7-02 Fuzzing.mp422.10M
| | ├──7-03 Finding the Offset.mp457.49M
| | ├──7-04 Overwriting the EIP.mp413.32M
| | ├──7-05 Finding Bad Characters.mp416.16M
| | ├──7-06 Finding the Right Module.mp432.39M
| | └──7-07 Generating ShellCode_Gaining Root.mp416.58M
| ├──08 Exploitation
| | ├──8-01 Gaining Root with Metasploit.mp457.91M
| | ├──8-02 Compiling an Exploit.mp419.15M
| | ├──8-03 Modifying Shellcode.mp4166.74M
| | ├──8-04 Client Side Attacks.mp480.64M
| | ├──8-05 Java Applet Attacks.mp422.72M
| | ├──8-06 Antivirus Bypassing.mp419.26M
| | └──8-07 Pre-Exploit Password Attacks.mp4107.86M
| ├──09 WebApp Exploitation
| | ├──9-01 Installing XSS_MySQL FILE.mp43.31M
| | ├──9-02 Cross-Site Scripting(XSS).mp419.93M
| | ├──9-03 SQL Injection (SQLi).mp462.98M
| | ├──9-04 Local File Inclusion (LFI).mp438.10M
| | └──9-05 Remote File Inclusion (RFI).mp424.35M
| ├──10 File Transfers
| | └──10-01 Introduction to File Transfers.mp458.33M
| ├──11 Privilege Escalation
| | └──11-01 Introduction to Privilege Escalation.mp4223.69M
| ├──12 Post Exploitation
| | ├──12-01 Linux Post Exploitation.mp4132.29M
| | ├──12-02 Windows Post Exploitation.mp432.42M
| | ├──12-03 Post-Exploit Password Attacks.mp484.79M
| | └──12-04 Pivoting.mp454.80M
| ├──13 Capstone
| | ├──13-01 Kioptrix Level 1.1 Walkthrough.mp4118.74M
| | ├──13-02 BTRSys 2.1 Walkthrough.mp4168.94M
| | ├──13-03 DroopyCTF Walkthrough.mp4128.58M
| | └──13-04 SickOS 1.2 Walkthrough.mp4161.34M
| └──14 Summary
| | └──14-01 Course Conclusion.mp412.45M
├──PEN-200:OSCP
| ├──OSCP报告模板.rar5.74M
| ├──OSCP备考指南.pdf3.03M
| ├──OSCP课程.txt0.90kb
| └──OSCP命令大全.md94.63kb
└──1-OSCP自学笔记-October靶机练习.pdf1.80M
**** 本内容需购买 ****
强烈支持楼主ing…… 强烈支持楼主ing…… 强烈支持楼主ing…… 强烈支持楼主ing…… 楼主加油,我们都看好你哦。 太生气了,无法HOLD啦 >_<...... 无回帖,不论坛,这才是人道。 楼主加油,我们都看好你哦。 感恩无私的分享与奉献 :)