CODENAME: Samurai Skills – Real World Penetration Testing Training[Ninja-Sec]


    Seeders : 1      Leechers : 2


GamesToday.org

Note :

Please Update (Trackers Info) Before Start "CODENAME: Samurai Skills – Real World Penetration Testing Training[Ninja-Sec]" Torrent Downloading to See Updated Seeders And Leechers for Batter Torrent Download Speed.

Trackers List

Tracker NameLast CheckStatusSeedersLeechers
udp://9.rarbg.com:2710/announce1 Year+success11
http://tracker.aletorrenty.pl:2710/announce1 Year+success12
udp://coppersurfer.tk:6969/announce1 Year+success11
udp://tracker.coppersurfer.tk:801 Year+success11
http://tracker.thepiratebay.org/announce1 Year+failed00
http://tracker.windsormetalbattery.com/announce1 Year+success00
http://tracker.winglai.com/announce1 Year+success00
udp://tracker.btzoo.eu:80/announce1 Year+failed00
http://torrent-tracker.ru/announce.php1 Year+success00
http://explodie.org:6969/announce1 Year+failed00
http://torrent.gresille.org/announce1 Year+success00
http://tracker.best-torrents.net:6969/announce1 Year+failed00
udp://tracker.ilibr.org:6969/announce1 Year+failed00
udp://tracker.zond.org:80/announce1 Year+failed00
http://announce.torrentsmd.com:6969/announce1 Year+success00
http://bigfoot1942.sektori.org:6969/announce1 Year+success00
http://tracker.istole.it/announce1 Year+failed00
http://tracker.publicbt.com/announce1 Year+failed00
http://exodus.desync.com:6969/announce1 Year+failed00
http://tracker.nwps.ws:6969/announce1 Year+success00
udp://10.rarbg.me:80/announce1 Year+failed00
http://fr33dom.h33t.com:3310/announce1 Year+failed00
http://tracker.trackerfix.com/announce1 Year+success00
udp://ipv4.tracker.harry.lu:80/announce1 Year+failed00
udp://tracker.istole.it:80/announce1 Year+failed00
udp://tracker.openbittorrent.com:80/announce1 Year+failed00
udp://tracker.publicbt.com:80/announce1 Year+failed00
udp://open.demonii.com:1337/announce1 Year+success00
udp://tracker.ccc.de:80/announce1 Year+failed00
udp://tracker.token.ro:80/announce1 Year+failed00



Torrent File Content (59 files)


Codename Samurai Skills Course
    Module 7 - Web Exploitation Techniques
          Module 7 - Web Exploitation Techniques.mp4 -
746.74 MB

    Module 2 - Real World Information Intelligence Techniques
          Module 2 - Real World Information Intelligence Techniques.mp4 -
385.85 MB

    Module 8 - Windows exploit development
          Module 8 - Windows exploit development.mp4 -
367.47 MB

    Module 5 - Windows and Unix Attacking Techniques
          Module 5 - Windows and Unix Attacking Techniques.mp4 -
328.13 MB

    Module 3 - Scanning and vulnerability Assessment
          Module 3 - Scanning and vulnerability Assessment.mp4 -
306.65 MB

    Module 6 - Windows and Unix Post Exploitation Techniques
          Module 6 - Windows and Unix Post Exploitation Techniques.mp4 -
285.69 MB

    Module 4 - Network Attacking Techniques
          Module 4 - Network Attacking Techniques.mp4 -
119.45 MB

    Module 1 - Solid Introduction to penetration testing
          Module 1 - Solid Introduction to penetration testing.mp4 -
82.81 MB

    books
          Module 5- Windows & Unix Attacking Techniques.pdf -
1.84 MB

          Module 2- Real World Information Intelligence Techniques .pdf -
1.64 MB

          Module 3- Scanning and Assessment.pdf -
1.53 MB

          Module 6- Windows &Unix Post-Exploitation Techniques.pdf -
1.34 MB

          Module 7- Web Exploitation Techniques .pdf -
640.9 KB

          Module 4- Network Attacking Techniques.pdf -
569.89 KB

    Module 7 - Web Exploitation Techniques
          Module 7 - Web Exploitation Techniques_controller.swf -
439.86 KB

    Module 6 - Windows and Unix Post Exploitation Techniques
          Module 6 - Windows and Unix Post Exploitation Techniques_controller.swf -
439.86 KB

    Module 1 - Solid Introduction to penetration testing
          Module 1 - Solid Introduction to penetration testing_controller.swf -
439.86 KB

    Module 8 - Windows exploit development
          Module 8 - Windows exploit development_controller.swf -
439.86 KB

    Module 4 - Network Attacking Techniques
          Module 4 - Network Attacking Techniques_controller.swf -
439.86 KB

    Module 5 - Windows and Unix Attacking Techniques
          Module 5 - Windows and Unix Attacking Techniques_controller.swf -
439.86 KB

    Module 2 - Real World Information Intelligence Techniques
          Module 2 - Real World Information Intelligence Techniques_controller.swf -
439.86 KB

    Module 3 - Scanning and vulnerability Assessment
          Module 3 - Scanning and vulnerability Assessment_controller.swf -
439.86 KB

    books
          Module 1- Solid Introduction to Penetration Testing .pdf -
425.25 KB

          Module 8- Windows_exploit_development.pdf -
337.49 KB

          Thumbs.db -
33.5 KB

    Module 1 - Solid Introduction to penetration testing
          Thumbs.db -
12.5 KB

    Module 4 - Network Attacking Techniques
          Thumbs.db -
12 KB

    Module 5 - Windows and Unix Attacking Techniques
          Module 5 - Windows and Unix Attacking Techniques_config.xml -
11.31 KB

    Module 8 - Windows exploit development
          swfobject.js -
9.53 KB

    Module 1 - Solid Introduction to penetration testing
          swfobject.js -
9.53 KB

    Module 2 - Real World Information Intelligence Techniques
          swfobject.js -
9.53 KB

    Module 3 - Scanning and vulnerability Assessment
          swfobject.js -
9.53 KB

    Module 5 - Windows and Unix Attacking Techniques
          swfobject.js -
9.53 KB

    Module 4 - Network Attacking Techniques
          swfobject.js -
9.53 KB

    Module 7 - Web Exploitation Techniques
          swfobject.js -
9.53 KB

    Module 6 - Windows and Unix Post Exploitation Techniques
          swfobject.js -
9.53 KB

          Module 6 - Windows and Unix Post Exploitation Techniques_config.xml -
8.24 KB

    Module 3 - Scanning and vulnerability Assessment
          Module 3 - Scanning and vulnerability Assessment_config.xml -
7.31 KB

    Module 2 - Real World Information Intelligence Techniques
          Module 2 - Real World Information Intelligence Techniques_config.xml -
6.8 KB

    Module 1 - Solid Introduction to penetration testing
          Module 1 - Solid Introduction to penetration testing_config.xml -
5.28 KB

    Module 4 - Network Attacking Techniques
          Module 4 - Network Attacking Techniques_config.xml -
5.18 KB

    Module 7 - Web Exploitation Techniques
          Module 7 - Web Exploitation Techniques_config.xml -
4.93 KB

    Module 8 - Windows exploit development
          Module 8 - Windows exploit development_config.xml -
4.83 KB

    Module 2 - Real World Information Intelligence Techniques
          Module 2 - Real World Information Intelligence Techniques.html -
3.45 KB

    Module 6 - Windows and Unix Post Exploitation Techniques
          Module 6 - Windows and Unix Post Exploitation Techniques.html -
3.45 KB

    Module 1 - Solid Introduction to penetration testing
          Module 1 - Solid Introduction to penetration testing.html -
3.42 KB

    Module 5 - Windows and Unix Attacking Techniques
          Module 5 - Windows and Unix Attacking Techniques.html -
3.39 KB

    Module 3 - Scanning and vulnerability Assessment
          Module 3 - Scanning and vulnerability Assessment.html -
3.39 KB

    Module 8 - Windows exploit development
          Module 8 - Windows exploit development.html -
3.33 KB

    Module 4 - Network Attacking Techniques
          Module 4 - Network Attacking Techniques.html -
3.32 KB



Description



 							From :
http://www.darknet.org.uk/2012/05/codename-samurai-skills-real-world-penetration-testing-training/

The main focus of this course is to teach you the following skills:

Gather Information Intelligence
Find Web Applications and System Security Vulnerabilities
Scan Your Target Stealthily
Exploit Web Applications and System Vulnerabilites
Conduct Real World Client Side Attacks
Conduct Tactical Post Exploitation on Windows and Linux Systems
Develop Windows Exploits
They themselves consider this a medium level course and are promising to come out with a more advanced course soon. I consider this course a good introduction to pen testing or as a good supplement to other more hardcore courses (like OSCP).

There’s a fair mix of introductory material and slides + ample video which walks you through the slides and shows hands on demonstrations.

The course covers 8 modules:

Module 1:Solid Introduction to Penetration Testing
Module 2:Real World Information Intelligence Techniques
Module 3:Scanning and Vulnerability Assessment
Module 4:Network Attacking Techniques
Module 5:Windows – Unix Attacking Techniques
Module 6:Windows – Unix Post-exploitation Techniques
Module 7:Web Exploitation Techniques
Module 8:Windows Exploit Development
Each module contains a ‘book’ – which is basically a set of presentation slides and video content – the length of the video varies greatly between chapters (the shortest is the introduction at 35 minutes and the longest is almost 5 hours for module 7).

The presentation slides generally give some introductory material, then run through the relevant subject in a fair amount of depth.

Related torrents

Torrent NameAddedSizeSeedLeechHealth
1 Year+ - in Other2.57 GB00
1 Year+ - in Other2.57 GB06
1 Year+ - in Other1.55 GB202
1 Year+ - in Other862.03 MB00
1 Year+ - in Other631.24 MB00

Note :

Feel free to post any comments about this torrent, including links to Subtitle, samples, screenshots, or any other relevant information. Watch CODENAME: Samurai Skills – Real World Penetration Testing Training[Ninja-Sec] Full Movie Online Free, Like 123Movies, FMovies, Putlocker, Netflix or Direct Download Torrent CODENAME: Samurai Skills – Real World Penetration Testing Training[Ninja-Sec] via Magnet Download Link.

Comments (0 Comments)




Please login or create a FREE account to post comments

Latest Searches