软考-国际渗透测试认证OSCP 2022 含资料
上次更新时间:2024-11-13
课程售价: 2.9 元
联系右侧微信客服充值或购买课程
课程内容
1. O3CP 官方教材和视频
- 2. Getting Comfortable With Kali Linux (免费)
- 3. Command Line Fun (免费)
- 4. Practical Tools
- 5. Bash Scripting
- 6. Passive Information Gathering
- 7. Active Information Gathering
- 8. Vulnerability Scanning
- 9. Web Application Attacks
- 10. Introduction To Buffer Overflows
- 11. Windows Buffer Overflows
- 12. Linux Buffer Overflows
- 13. Client Side Attacks
- 14. Locating Public Exploits
- 15. Fixing Exploits
- 16. File Transfers
- 17. Antivirus Evasion
- 18. Privilage Escalation
- 19. Password Attacks
- 20. Port Redirection and Tunneling
- 21. Active Directory Attacks (2)
- 22. The Metasploit Framework
- 23. Powershell Empire
- 24. AssemblingThe Pieces
2. O3CP 实战培训视频和靶机
- 1. Overview of Lab Commands and Tools
- 2. Download and Configure Kali Linux
- 3. Download Vulnerable Lab VMs
- 4. Kioptrix Level 1 - Enumeration and Exploitation
- 5. Kioptrix Level 2 - Enumeration and Exploitation
- 6. Kioptrix Level 3 - Enumeration and Exploitation
- 7. Kioptrix Level 4 - Enumeration and Exploitation
- 8. Kioptrix Level 5 - Enumeration and Exploitation
- 9. Tr0ll 1 - Enumeration and Exploitation
- 10. Tr0ll 2 - Enumeration and Exploitation Technet24
- 11. Bonus Lab 1 Security Onion Lab Setup with VirtualBox
- 12. Bonus Lab 2 Windows 7 Eternalblue Vulnerable VM VirtualBox Setup
- 13. Bonus Lab 3 Windows 7 Eternalblue Exploitation and SnortPCAP Analysis
- 14. Bonus Lab 4 Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup
- 15. Bonus Lab 5 Ubuntu Server 12.04 Heartbleed Exploitation and SnortPCAP Analysis
- 16. Bonus Lab 6 SLMail Buffer Overflow Development
- 1.Overview of Lab Commands and Tools
- 2.Download and Configure Kali Linux VM on VirtualBox
- 3.Download and Configure Window 7 Analysis VM
- 4.Download Vulnerable Lab VMs
- 5.PwnLab VM Enumeration and Exploitation
- 6.Brainpan 1 VM Enumeration and Exploitation
- 7.Mr Robot 1 VM Enumeration and Exploiotation
- 8.SickOS VM Enumeration and Exploitation
- 9.SkyTower 1 VM Enumeration and Exploitation
- 10.Introduction to Hackthebox
- 11.Active VM Enumeration and Exploitation
- 12.Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)
- 13.Apache Struts Setup and Exploitation
- 14.Introduction to Hack.me
- 15.Wordpress Enumeration and Exploitation
- 1.Overview of Lab Commands and Tools
- 2.Download and Configure Kali Linux VM on VirtualBox
- 3.Download Vulnerable Lab VMs
- 4.Goldeneye Enumeration and Exploitation
- 5.Raven 1 Enumeration and Exploitation
- 6.Raven 2 Enumeration and Exploitation
- 7.Lampiao Enumeration and Exploitation
- 8.DerpnStink Enumeration and Exploitation
- 9.Stapler Enumeration and Exploitation
- 10.VulnOS 2 Enumeration and Exploitation
- 11.Windows 7 Enumeration and Exploitation
- 12.IMF Enumeration and Exploitation
- 13.XSS Firing Range Enumeration and Exploitation
- 001 Introduction
- 002 Download and Configure Kali Linux VM on VirtualBox
- 003 Download and Config Vulnerable Attack Target VMs
- 004 Tr0ll 3 Enumeration and Exploitation
- 005 Matrix 3 Enumeration and Exploitation
- 006 Broken Gallery Enumeration and Exploitation
- 007 DumbUser (Windows 10) Enumeration and Exploitation
- 008 Symfonos 1 Enumeration and Exploitation
- 009 Symfonos 2 Enumeration and Exploitation
- 010 Symfonos 3 Enumeration and Exploitation
- 011 Symfonos 4 Enumeration and Exploitation
- 012 Symfonos 5 Enumeration and Exploitation
- 013 digialworld.local JOY Enumeration and Exploitation
- 014 digitalworld.local Torment Enumeration and Exploitation
课程内容
2个章节 , 81个讲座
1. O3CP 官方教材和视频
- 2. Getting Comfortable With Kali Linux (免费)
- 3. Command Line Fun (免费)
- 4. Practical Tools
- 5. Bash Scripting
- 6. Passive Information Gathering
- 7. Active Information Gathering
- 8. Vulnerability Scanning
- 9. Web Application Attacks
- 10. Introduction To Buffer Overflows
- 11. Windows Buffer Overflows
- 12. Linux Buffer Overflows
- 13. Client Side Attacks
- 14. Locating Public Exploits
- 15. Fixing Exploits
- 16. File Transfers
- 17. Antivirus Evasion
- 18. Privilage Escalation
- 19. Password Attacks
- 20. Port Redirection and Tunneling
- 21. Active Directory Attacks (2)
- 22. The Metasploit Framework
- 23. Powershell Empire
- 24. AssemblingThe Pieces
2. O3CP 实战培训视频和靶机
- 1. Overview of Lab Commands and Tools
- 2. Download and Configure Kali Linux
- 3. Download Vulnerable Lab VMs
- 4. Kioptrix Level 1 - Enumeration and Exploitation
- 5. Kioptrix Level 2 - Enumeration and Exploitation
- 6. Kioptrix Level 3 - Enumeration and Exploitation
- 7. Kioptrix Level 4 - Enumeration and Exploitation
- 8. Kioptrix Level 5 - Enumeration and Exploitation
- 9. Tr0ll 1 - Enumeration and Exploitation
- 10. Tr0ll 2 - Enumeration and Exploitation Technet24
- 11. Bonus Lab 1 Security Onion Lab Setup with VirtualBox
- 12. Bonus Lab 2 Windows 7 Eternalblue Vulnerable VM VirtualBox Setup
- 13. Bonus Lab 3 Windows 7 Eternalblue Exploitation and SnortPCAP Analysis
- 14. Bonus Lab 4 Ubuntu Server 12.04 Vulnerable VM VirtualBox Setup
- 15. Bonus Lab 5 Ubuntu Server 12.04 Heartbleed Exploitation and SnortPCAP Analysis
- 16. Bonus Lab 6 SLMail Buffer Overflow Development
- 1.Overview of Lab Commands and Tools
- 2.Download and Configure Kali Linux VM on VirtualBox
- 3.Download and Configure Window 7 Analysis VM
- 4.Download Vulnerable Lab VMs
- 5.PwnLab VM Enumeration and Exploitation
- 6.Brainpan 1 VM Enumeration and Exploitation
- 7.Mr Robot 1 VM Enumeration and Exploiotation
- 8.SickOS VM Enumeration and Exploitation
- 9.SkyTower 1 VM Enumeration and Exploitation
- 10.Introduction to Hackthebox
- 11.Active VM Enumeration and Exploitation
- 12.Windows 2008 Setup, Enumeration and Exploitation (Metasploitable 3)
- 13.Apache Struts Setup and Exploitation
- 14.Introduction to Hack.me
- 15.Wordpress Enumeration and Exploitation
- 1.Overview of Lab Commands and Tools
- 2.Download and Configure Kali Linux VM on VirtualBox
- 3.Download Vulnerable Lab VMs
- 4.Goldeneye Enumeration and Exploitation
- 5.Raven 1 Enumeration and Exploitation
- 6.Raven 2 Enumeration and Exploitation
- 7.Lampiao Enumeration and Exploitation
- 8.DerpnStink Enumeration and Exploitation
- 9.Stapler Enumeration and Exploitation
- 10.VulnOS 2 Enumeration and Exploitation
- 11.Windows 7 Enumeration and Exploitation
- 12.IMF Enumeration and Exploitation
- 13.XSS Firing Range Enumeration and Exploitation
- 001 Introduction
- 002 Download and Configure Kali Linux VM on VirtualBox
- 003 Download and Config Vulnerable Attack Target VMs
- 004 Tr0ll 3 Enumeration and Exploitation
- 005 Matrix 3 Enumeration and Exploitation
- 006 Broken Gallery Enumeration and Exploitation
- 007 DumbUser (Windows 10) Enumeration and Exploitation
- 008 Symfonos 1 Enumeration and Exploitation
- 009 Symfonos 2 Enumeration and Exploitation
- 010 Symfonos 3 Enumeration and Exploitation
- 011 Symfonos 4 Enumeration and Exploitation
- 012 Symfonos 5 Enumeration and Exploitation
- 013 digialworld.local JOY Enumeration and Exploitation
- 014 digitalworld.local Torment Enumeration and Exploitation