Author: ziuziu on 5-09-2015, 12:15
http://i65.fastpic.ru/big/2015/0905/99/3f684cf7375aa0b9686c55be0f8e3399.jpg

Pluralsight - Ethical Hacking: Enumeration
Size: 617MB | Duration: 3h 00m | Video: AVC (.mp4) 1024x576 15fps | Audio: AAC 44.1KHz 2ch
Genre: eLearning | Level: Beginner | Language: English

Now that we've found out "live" systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data such as usernames, computer names, network share, and more.
Enumeration is the first official attack at your target. Enumeration is the process of gathering information that might include user names, computer names, network shares, services running, and other possible points of entry. This course we'll show different techniques that can be used against your network.

http://i69.fastpic.ru/big/2015/0905/68/11d3090c37bd96736bc6d4e8db45f768.jpg

Download link:
Links are Interchangeable - Single Extraction - Premium is support resumable

Dear visitor, you are browsing our website as Guest.
We strongly recommend you to register and login to view hidden contents.

Information
Would you like to leave your comment? Please Login to your account to leave comments. Don't have an account? You can create a free account now.
MEMBER PANEL

Register | Forgot Password
OUR NETWORK
ONLINE SUPPORT
ADVERTISING
Link 1
Designed by fanrx.com
Go Daddy Web Hosting! A completely unique experience - only  $1.99 / mo from Go Daddy! - 468x60