Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Search the Community

Showing results for tags '101'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 4 results

  1. Create a Concept for a Manga Short Story! Description Have you ever wished to draw your own manga but have difficulty when it comes to planning out your project? Or are you an illustrator, who wants to go into sequential art? Then this course is for you. My name is Olga Rogalski from Studio Oruga. I have published manga professionally and have been in love with manga for many many years. In this course I want to teach you my techniques. In this course I will be teaching you how to turn a manga idea into an executable concept for a short story. One of the first things I learned, when I started drawing manga, was the importance to be able to portray a story on a limited amount of pages. Whether for a contest or for a publisher, this is a skill that is absolutely essential! Now, I would like to share my knowledge with you. Let´s get those amazing ideas that are still stuck in your head onto paper! So let´s begin! After you have finished all the lectures, I suggest that you develop the concept for a 20 page story by using the materians and information provided in this course. I want you to do the following things: Come up with the idea for a short story Write the scenes that will happen in the story and assign pages to them based on the Beginning - Midpoint - Conclusion-system Write down the dialogues and panel descriptions of what will happen on the pages. Develop character descriptions that fit the story Plan your project by using the materials from the Project Management part Use the page templates in order to plan your paneling by using the information from the Paneling section [Hidden Content] [hide][Hidden Content]]
  2. 101 Labs - Book Series Experts agree that we retain only 10% of what we read but 90% of what we do. Perhaps this explains why the global pass rate for most IT exams is a ghastly 40%. This is where the 101 Labs book series can help. We are revolutionizing how IT people train for their exams and the real world with our Learn - By - Doing teaching method. 101 Labs’ mission is to turn you into an IT expert by doing instead of reading. Using free software and free trials, our experts take you by the hand and walk you through every aspect of the protocols and technologies you will encounter in your IT career. We share our configuration tips and tricks with you as well as how to avoid the common mistakes many novice engineers make, which can quickly become career-ending. 101 Labs – CompTIA Security+ The exponential growth in network security attacks has led to a huge demand for certified staff and there is currently a shortfall in qualified security engineers. The CompTIA Security+ Exam is used by many as a gateway to a career in IT Security. It lays the foundation for CyberOps, Ethical Hacking, Penetration Testing, Digital Forensics, Chief Information Security Officer (CISO) and more. If you have an interest in learning cybersecurity but are not sure where to start, then the CompTIA Security+ is the perfect choice. This is a brand new course for the latest SY0-601 exam, which was recently launched. It covers all the latest topics, including security attacks, threat types, and protocols. Using free tools and software you configure: Kali Linux SQL Injection Attacks Implement IPSEC Site-to-Site VPN Using ARP for Network Reconnaissance Sniffing Network Attacks Using Wireshark Using Password Cracking Tools Scripting Using Bash and Python FTP Exploits Follow along with our instructor as he guides you through all the important commands, tools and utilities you need to know. We share our years of industry experience with you so you really feel prepared not only for the exams but the real world of system security administration. Please use the free resources at the 101labs website resources which will help you with the labs. About the Authors Paul Browning left behind a career in law enforcement in 2000 and started an IT consulting and training company. He's written over 15 best-selling IT books and through his books, classroom courses, and websites he’s trained tens of thousands of people from all walks of life. Mark Drinan is an avid Cyber Security enthusiast with experience working in the Cyber Security department of a Big Four company. Mark holds the PenTest+ and the SSCP certifications. [Hidden Content] [hide][Hidden Content]]
  3. Table of Contents About the Authors Introduction—101 Labs Lab 1. Credential Harvesting Using Site Cloning Lab 2. Nmap Lab 3. Recon-ng Lab 4. Conducting a Dictionary Attack to Crack Online Passwords Using Hydra Lab 5. Conducting a Cross Site Scripting (XXS) Attack Lab 6. Automating SQL Injection Using SQLmap Lab 7. How to Use Burp Suite to Intercept Client-side Requests Lab 8. Information Gathering Using theHarvester Lab 9. Evil Twin Attack with Airgeddon Lab 10. Using Curl Lab 11. Using Traceroute in Linux Lab 12. Ping and Its Various Uses Lab 13. How to SSH into a Server from a Windows Machine Using PuTTY Lab 14. How to SSH into a Server from a Linux Machine Lab 15. How to Setup Your Own Kali Linux Virtual Machine Lab 16. Nslookup Lab 17. Dig Lab 18. Using Ipconfig to View and Modify Network Information on Windows Lab 19. Using Ifconfig to View and Modify Network Information on Linux Lab 20. Hping for Security Auditing and Testing of Network Devices Lab 21. Using Netstat to View Networking Information Lab 22. Netcat Lab 23. IP Scanners Lab 24. Using ARP for Network Reconnaissance Lab 25. Using Route to Display Network Information on Linux Lab 26. Using Scanless for Easy Anonymous Port Scanning Lab 27. Directory Traversal Lab 28. Gathering DNS Information with Dnsenum Lab 29. How to Connect to an Internal Network Using OpenVPN Lab 30. How to Crack Passwords with Hashcat Lab 31. Fuzzing with Spike Lab 32. Spoofing your MAC Address with Macchanger Lab 33. Perform a Network Vulnerability Scan with OpenVAS Lab 34. Automate WordPress Scanning with Wpscan Lab 35. Hack WPS with Reaver Lab 36. Cross Site Request Forgery (CSRF) Lab 37. Using Gobuster to Discover Directories Lab 38. Using Burp Suite’s Intruder Lab 39. Broken Access Control Lab 40. Broken Access Control Lab 41. Getting a Reverse Shell on a Server through a File Upload Lab 42. Manual Privilege Escalation Using Python Lab 43. Web Application Vulnerability Scanning with Nikto Lab 44. Web Server Vulnerability Scanning with ZAP Lab 45. Capturing Password Hashes with Responder Lab 46. Monitoring Wi-Fi Signals with Kismet Lab 47. Sn1per Lab 48. Browser Exploitation Framework (BeEF) Lab 49. Hacking WPS Networks with Wifite Lab 50. Capturing Credentials Submitted through http with Wireshark Lab 51. Packet Capture with Tcpdump Lab 52. How to Discover Nearby Wi-Fi Networks with Airodump-ng Lab 53. How to Capture a WPA Handshake File Using Airodump-ng and Aireplay-ng Lab 54. How to Crack WPA Handshake Files Using Aircrack-ng Lab 55. Using Proxychains for Anonymous Hacking Lab 56. How to Use MD5 Checksums to Determine if a File Contains Malware Lab 57. How to Use Process Explorer to Find and Scan Suspicious Processes for Malware Lab 58. Fundamental Linux Concepts Lab 59. Linux Operations Advanced Linux Operations Lab 60. Basic File Operations Lab 61. Advanced File Operations Lab 62. Cracking Basic Hashes with John the Ripper Lab 63. Cracking Advanced Hashes with John the Ripper Lab 64. More Advanced Uses of John the Ripper Lab 65. Establishing a Reverse Shell with Netcat Lab 66. Establishing a Bind Shell with Netcat Lab 67. How to Stabilise Netcat Shells Lab 68. Getting a Reverse Shell Using Socat Lab 69. Establishing a Bind Shell Using Socat Lab 70. Establishing a Stable Socat Shell Lab 71. Upgrading a Limited Shell to Meterpreter Shell Using Metasploit Lab 72. Exploiting a Vulnerable FTP Service to Gain a Shell Using Metasploit Lab 73. Running a Vulnerability Scan with Nessus Lab 74. Creating Metasploit Payloads with Msfvenom Lab 75. Establishing a Reverse Shell on a Linux Target Using Msfvenom and Metasploit Lab 76. Establishing a Bind Shell on a Linux Target Using Msfvenom and Metasploit Lab 77. Basic Meterpreter Commands Lab 78. More Advanced Meterpreter Commands Lab 79. Introduction to Bash Scripting Lab 80. More Bash Scripting Lab 81. Advanced Bash Scripting Lab 82. How to Establish a Meterpreter Shell on a Windows Target Using SET Lab 83. How to Migrate to a Different Process on the Target Machine after Establishing a Meterpreter Shell Lab 84. How to Use Mimikatz to Extract all the Passwords from a Windows Machine Lab 85. How to Enumerate for Privilege Escalation on a Windows Target with WinPEAS Lab 86. How to Enumerate for Privilege Escalation on a Linux Target with LinPEAS Lab 87. OWASP A1—OS Command Injection Lab 88. OWASP A2—Broken Authentication and Session Management: Username Enumeration Vulnerability Lab 89. OWASP A3—Sensitive Information Disclosure Lab 90. OWASP A4—EML External Entities (XXE) Lab 91. OWASP A5—Broken Access Control Lab 92. OWASP A6—Security Misconfiguration Lab 93. OWASP A7—Cross Site Scripting (XSS) Lab 94. OWASP A8—Insecure Deserialization Lab 95. OWASP A9—Using Components with Known Vulnerabilities Lab 96. OWASP A10—Unvalidated Redirects and Forwards Lab 97. Introduction to Python Scripting Lab 98. More Python Scripting Lab 99. More Advanced Python Scripting Lab 100. Introduction to Scripting with PowerShell Lab 101. More Advanced Scripting with PowerShell [Hidden Content] [hide][Hidden Content]]
  4. What you'll learn Lectures in PDF + Live Video Training TOP 10 web app. and website related hacking techniques IT security essentials ZIP package with all the source codes and examples 21 important techniques Video sessions transcript of every module Requirements basic IT knowledge Basic Microsoft Windows knowledge Description LAST UPDATED: 11/2020 Ethical Hacking Course: Website Hacking in Practice Training course - finally published! Welcome to Hacking School: Website Hacking in Practice Training! Before we begin – the practical use of the training you are going to see has been proven by vast group of people – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, black- and white hat hackers. Please, read carefully what we'd like to share with you. The course covers all important hacking techniques used by hackers and system administrators. About the Ethical Hacking Training course (what you can expect): It is a step by step training on Website and Web-application ethical hacking and security. It covers almost all of the Top 10 Most Critical Web Application Attacks presented yearly by OWASP organization (Open Web Application Security Project) + 10 common techniques / vulnerabilities more. It can be treated as a valuable source of knowledge for any white hat hacker, web developer, system administrator or IT security consultant. You will learn how to hack using 21 interesting techniques and see how each of them can be used in a practical real-life example. You will get access to all the lectures in PDF format and live Ethical Hacking Video Training sessions you can watch on-line. Every lecture also contains a video session transcript with screen shots - you can print it and use it during your training. Finally you will be provided with all the source codes and examples shown in the course. You can simply download the zip package from our server. Who this course is for: web / app developers system admins IT sec professionals everyone interested in hacking ethical hackers [Hidden Content] [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.