种子简介
种子名称:
UDEMY HACKING WIRELESS NETWORKS THEORY AND PRACTICE TUTORIAL
文件类型:
视频
文件数目:
25个文件
文件大小:
787.39 MB
收录时间:
2017-5-11 12:02
已经下载:
3次
资源热度:
291
最近下载:
2025-1-9 03:43
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:88bfe1a2837987b56e612b48f6a55db467832f40&dn=UDEMY HACKING WIRELESS NETWORKS THEORY AND PRACTICE TUTORIAL
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
UDEMY HACKING WIRELESS NETWORKS THEORY AND PRACTICE TUTORIAL.torrent
04_-_Introduction_to_wireless_networks/10_-_Wireless_network_interface_cards_in_Linux.mp48.03MB
05_-_Wireless_security_half_measures_-_An_overview/12_-_Changing_the_MAC_address_of_the_wireless_network_card.mp416.31MB
05_-_Wireless_security_half_measures_-_An_overview/14_-_Finding_a_hidden_access_point_with_disabled_ESSID_broadcast.mp415.37MB
06_-_Wireless_network_attacks_independent_of_used_encryption/19_-_The_use_of_deauthentication_attack_for_jamming_network_traffic.mp414.56MB
07_-_WEP_attacks/28_-_Interactive_packet_replay_and_ARP_request_replay.mp420.11MB
07_-_WEP_attacks/27_-_Generating_packets_without_knowing_the_network_key.mp414.09MB
07_-_WEP_attacks/25_-_The_overview_and_demonstration_of_the_chop-chop_attack.mp413.77MB
07_-_WEP_attacks/29_-_The_demonstration_of_the_PTW_and_KoreK_attacks.mp412MB
07_-_WEP_attacks/31_-_Creating_a_fake_access_point_the_Caffe_Latte_attack.mp49.91MB
08_-_WPA_attacks/34_-_The_dictionary_attack_on_WPA.mp412.34MB
08_-_WPA_attacks/37_-_The_dictionary_attack_on_WPA_using_hash_tables.mp48.91MB
09_-_CUDA-powered_attacks/46_-_CUDA_the_attack_on_WPA.mp435.56MB
09_-_CUDA-powered_attacks/43_-_The_compilation_and_installation_of_the_tools_with_CUDA_support.mp428.41MB
09_-_CUDA-powered_attacks/48_-_Applications_for_cracking_MD4_and_MD5_hashes_with_the_use_of_CUDA_technology.mp420.73MB
09_-_CUDA-powered_attacks/44_-_The_optimization_of_the_parameters_of_an_nVidia_video_card.mp419.45MB
09_-_CUDA-powered_attacks/42_-_The_installation_of_CUDA-SDK_and_CUDA-Toolkit.mp414.63MB
09_-_CUDA-powered_attacks/45_-_CUDA_preparation_for_the_attack.mp49.44MB
09_-_CUDA-powered_attacks/47_-_Generating_your_own_dictionary.mp49.01MB
09_-_CUDA-powered_attacks/41_-_CUDA_the_initial_preparation_of_the_environment.mp47.22MB
13_-_Free_additions/58_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_Monitoring_Transmitted_Data.mp4261.49MB
13_-_Free_additions/60_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_WiFi_Security_-_Overview_and_sol....mp4137.09MB
13_-_Free_additions/61_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_WiFi_Security_-_Threats.mp489.59MB
13_-_Free_additions/57_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_Monitoring_-_What_you_will_learn.mp44.85MB
13_-_Free_additions/59_-_IT_SEC_Beginner_-_Certified_Hacking_Training_-_WiFi_Security_-_What_you_will_learn.mp44.52MB
13_-_Free_additions/62_-_Website_Hacking_in_Practice_Course_-_Module_13._SQL_injection_-_Video_Training.mp4243B