|
OSCP/4 m# M5 d1 n" l6 {7 S
├──INE机构OSCP课程 9 i; s4 m4 B: J) k/ j: J& ^
| ├──01 Overview
4 }& J# r# C9 \| | └──01 Course Introduction.mp4 20.77M
; F2 A! @- a$ w! A* u| ├──02 Introduction to Kali Linux " j( Q% O& ~. M- d" ~
| | ├──2-01 Installing Kali Linux.mp4 20.96M$ e) `7 X5 K) g E1 ?
| | ├──2-02 Command Line Refresher.mp4 61.35M" ]. o' a+ U; K! l( ?3 R. V* I
| | ├──2-03 Kali Linux Services.mp4 22.56M
+ D9 p( X& S# W/ {# g4 j& v- `| | └──2-04 Bash Scripting in Kali Linux.mp4 50.77M
) _! d$ V# V/ u4 L W: C8 F1 g| ├──03 Information Gathering
! S; y& h) H1 W) H$ q| | └──3-01 Information Gathering.mp4 67.36M! ?1 g* Z$ B- P2 G& h, E
| ├──04 Scanning - a3 @, N7 V9 ]1 E# O! C/ i1 t3 N3 q. j
| | ├──4-01 TCP VS UDP.mp4 11.36M
$ h0 g/ H; M; C( U( O| | ├──4-02 Scanning with Nmap.mp4 191.68M
' ~. k) {) }* y| | ├──4-03 Scanning with Nessus.mp4 15.21M; ~' ~" }, t9 m( a1 \9 g" S" q
| | └──4-04 Scanning with Metasploit.mp4 74.25M3 y, i1 R2 T+ L0 Y) C6 ?: i/ `- p
| ├──05 Enumeration 7 a, a+ v4 Q* i- a* s) }
| | ├──5-01 Installing Kioptrix Level 1.mp4 11.84M! {9 ? F0 A) g4 S; g- L8 j% m6 s
| | ├──5-02 SSH Enumeration.mp4 74.42M, ` l# W. z. R1 ]
| | ├──5-03 HTTP Enumeration.mp4 115.76M
) q( q6 K) w. _4 z/ L| | ├──5-04 SMB Enumeration.mp4 141.90M
/ f# ~* A# I6 ~' }. y$ q3 F| | ├──5-05 DNS Enumeration.mp4 51.86M( @8 o# _, O. \5 K: d
| | └──5-06 Other Enumeration.mp4 4.61M, l! s& a: M3 q x
| ├──06 Netcat
6 S: q$ E. w6 {2 S6 G. l( I" R| | └──6-01 Introduction to Netcat.mp4 13.92M/ Z( P( j/ F) p1 s
| ├──07 Buffer Overflows # I$ s( R4 x1 _
| | ├──7-01 Introduction to Buffer Overflows.mp4 7.44M! [. p, c: e! V9 F9 G3 ~; ~# P7 k4 N
| | ├──7-02 Fuzzing.mp4 22.10M" X2 c+ S, P4 y
| | ├──7-03 Finding the Offset.mp4 57.49M: Z4 Q/ D- e3 f
| | ├──7-04 Overwriting the EIP.mp4 13.32M6 t8 R& ~6 g O6 _' n
| | ├──7-05 Finding Bad Characters.mp4 16.16M# N- M3 [' \4 B
| | ├──7-06 Finding the Right Module.mp4 32.39M4 Z: f/ J; l% F5 l$ T+ {
| | └──7-07 Generating ShellCode_Gaining Root.mp4 16.58M2 Z* v4 K C$ B3 d0 w9 {
| ├──08 Exploitation " @' ]1 P1 B2 _/ F, H4 l
| | ├──8-01 Gaining Root with Metasploit.mp4 57.91M
# h6 X2 ~$ F; _) Q N1 @| | ├──8-02 Compiling an Exploit.mp4 19.15M3 x6 Y( q0 P3 ^3 p: P1 K
| | ├──8-03 Modifying Shellcode.mp4 166.74M" x8 X0 V S3 u3 r
| | ├──8-04 Client Side Attacks.mp4 80.64M) O4 r& i' p: `$ t% I. a
| | ├──8-05 Java Applet Attacks.mp4 22.72M
# {5 O! {0 N: z. |& S) e) v$ t| | ├──8-06 Antivirus Bypassing.mp4 19.26M& V: c9 G8 ^' ^* O' X2 s
| | └──8-07 Pre-Exploit Password Attacks.mp4 107.86M( i) n1 q) W7 h6 }0 A* ~" a
| ├──09 WebApp Exploitation 6 w+ L3 @: u: w! D
| | ├──9-01 Installing XSS_MySQL FILE.mp4 3.31M8 z1 L @+ i0 `8 n6 B
| | ├──9-02 Cross-Site Scripting(XSS).mp4 19.93M- w% Y$ `0 h$ o( J9 r" M$ ~
| | ├──9-03 SQL Injection (SQLi).mp4 62.98M- e& ]. O b. ?: J0 ?" c6 `7 ~8 M$ n3 p
| | ├──9-04 Local File Inclusion (LFI).mp4 38.10M& ?( z3 H" j9 y' E; ]3 h! }) A! P
| | └──9-05 Remote File Inclusion (RFI).mp4 24.35M' W& W7 V9 n1 b( F! l+ Z+ T
| ├──10 File Transfers 6 U6 V; ~: f) T0 J$ m
| | └──10-01 Introduction to File Transfers.mp4 58.33M
) V) o# d% [- y- P* ?6 Z| ├──11 Privilege Escalation 5 M) d& [( Z% Q+ \( e
| | └──11-01 Introduction to Privilege Escalation.mp4 223.69M3 r4 c9 d& d' ?* s7 i" U0 ?
| ├──12 Post Exploitation
* G. v) c2 S* ]7 I) Y. ~| | ├──12-01 Linux Post Exploitation.mp4 132.29M
) z/ z8 s" ]# C0 \- c% ]| | ├──12-02 Windows Post Exploitation.mp4 32.42M
, _4 ~" B( l! f6 y| | ├──12-03 Post-Exploit Password Attacks.mp4 84.79M
7 G1 L; B( _2 ~3 M| | └──12-04 Pivoting.mp4 54.80M% h: \6 \, D) O3 D+ F
| ├──13 Capstone " N8 e/ c+ T" _" F7 L$ ?8 F, }4 L; T
| | ├──13-01 Kioptrix Level 1.1 Walkthrough.mp4 118.74M+ B$ `: \$ v; d- e
| | ├──13-02 BTRSys 2.1 Walkthrough.mp4 168.94M+ Y. g% I/ B1 k4 ]$ V# [* r
| | ├──13-03 DroopyCTF Walkthrough.mp4 128.58M
+ b- _7 v# I/ ~; A; H1 i| | └──13-04 SickOS 1.2 Walkthrough.mp4 161.34M* D* E" {! F$ q+ Z9 B
| └──14 Summary : _5 A* }! c- ^
| | └──14-01 Course Conclusion.mp4 12.45M/ \/ f4 C' \. t8 A c
├──PEN-200:OSCP 8 G% U: i5 V: W4 |
| ├──OSCP报告模板.rar 5.74M6 q0 O7 P9 i+ u9 k
| ├──OSCP备考指南.pdf 3.03M( M3 g& X: x! N+ g1 a
| ├──OSCP课程.txt 0.90kb
+ x. c. p4 O2 B) R! r9 a| └──OSCP命令大全.md 94.63kb0 i8 l2 Q) {2 R9 x
└──1-OSCP自学笔记-October靶机练习.pdf 1.80M
# |) A: u6 {& ?3 M& H9 O
- X$ e+ p; Z& f( L' H# Q' B2 H+ w( q$ i+ n( U: Y
3 g3 Q+ @% G5 \, k/ o
& s; M6 V% c) p0 y* t* C% C( H' S& t! \
资源下载地址和密码(百度云盘): [/hide] 百度网盘信息回帖可见
7 _( d$ ]& B* l: ^* d6 \
9 T e) ^2 u; ~9 n7 h- h9 _" J( u
3 U; b, a9 d' x) o4 F) O5 N6 ]; z8 P; n$ ~
本资源由Java自学网收集整理【www.javazx.com】 |
|