FileMood

Download CBR7361

CBR7361

Name

CBR7361

 DOWNLOAD Copy Link

Total Size

489.1 MB

Total Files

37

Hash

85AB796D69B299A3B27F98C1468EBFF667C12424

/

0 Module 1: Introduction to USB Drop Attacks -- 0 1.1 Welcome - UA.mp4

25.7 MB

0 Module 1: Introduction to USB Drop Attacks -- 1 1.2 What is a USB Drop Attack - UA.mp4

22.4 MB

0 Module 1: Introduction to USB Drop Attacks -- 2 1.3 Section Recap - UA.mp4

1.7 MB

0 Module 1: Introduction to USB Drop Attacks -- 3 1.4 Why are These Attacks Effective - UA.mp4

9.1 MB

0 Module 1: Introduction to USB Drop Attacks -- 4 1.5 Summary and Module Quiz - UA.mp4

3.9 MB

1 Module 2: Types of USB Drop Attacks -- 0 2.1 Introduction - UA.mp4

1.7 MB

1 Module 2: Types of USB Drop Attacks -- 1 2.2 USB Human Interface Drive Spoofing - UA.mp4

17.0 MB

1 Module 2: Types of USB Drop Attacks -- 2 2.3 Malicious File_Code - UA.mp4

11.2 MB

1 Module 2: Types of USB Drop Attacks -- 3 2.4 Social Engineering Links - UA.mp4

10.3 MB

1 Module 2: Types of USB Drop Attacks -- 4 2.5 USB Kill - UA.mp4

7.0 MB

1 Module 2: Types of USB Drop Attacks -- 5 2.6 Zero Day - UA.mp4

6.1 MB

1 Module 2: Types of USB Drop Attacks -- 6 2.7 Summary and Module Quiz - UA.mp4

6.3 MB

2 Module 3: Disguising, Reconnaissance, and Deployment -- 0 3.1 Introduction - UA.mp4

460.6 KB

2 Module 3: Disguising, Reconnaissance, and Deployment -- 1 3.2 Disguising Attacks - UA.mp4

38.2 MB

2 Module 3: Disguising, Reconnaissance, and Deployment -- 2 3.3 What to Look for During Reconnaissance - UA.mp4

14.2 MB

2 Module 3: Disguising, Reconnaissance, and Deployment -- 3 3.4 Deploying the Devices - UA.mp4

8.8 MB

2 Module 3: Disguising, Reconnaissance, and Deployment -- 4 3.5 Summary and Module Quiz - UA.mp4

4.6 MB

3 Module 4: Human Interface Drive Spoofing Lab -- 0 4.1 Getting Started - UA.mp4

9.5 MB

3 Module 4: Human Interface Drive Spoofing Lab -- 1 4.2 Setting up Notepad++ - UA.mp4

14.7 MB

3 Module 4: Human Interface Drive Spoofing Lab -- 2 4.3 Getting to Know the USB Rubber Ducky - UA.mp4

31.1 MB

3 Module 4: Human Interface Drive Spoofing Lab -- 3 4.4 DuckyScript Part 1 - UA.mp4

30.7 MB

3 Module 4: Human Interface Drive Spoofing Lab -- 4 4.5 DuckyScript Part 2 - UA.mp4

13.7 MB

3 Module 4: Human Interface Drive Spoofing Lab -- 5 4.6 Hands on Example Part 1 - UA.mp4

22.5 MB

3 Module 4: Human Interface Drive Spoofing Lab -- 6 4.7 Hands on Example Part 2 - UA.mp4

23.3 MB

3 Module 4: Human Interface Drive Spoofing Lab -- 7 4.8 Summary - UA.mp4

1.9 MB

4 Module 5: Malicious Files_Code Lab -- 0 5.1 Getting Started - UA.mp4

7.8 MB

4 Module 5: Malicious Files_Code Lab -- 1 5.2 Hands on Example Part 1 - UA.mp4

26.2 MB

4 Module 5: Malicious Files_Code Lab -- 2 5.3 Hands on Example Part 2 - UA.mp4

29.4 MB

4 Module 5: Malicious Files_Code Lab -- 3 5.4 Summary - UA.mp4

1.6 MB

5 Module 6: Social Engineering Links Lab -- 0 6.1 Getting Started - UA.mp4

5.1 MB

5 Module 6: Social Engineering Links Lab -- 1 6.2 Hands on Lab Part 1 - UA.mp4

25.5 MB

5 Module 6: Social Engineering Links Lab -- 2 6.3 Hands on Lab Part 2 - UA.mp4

27.0 MB

5 Module 6: Social Engineering Links Lab -- 3 6.4 Summary - UA.mp4

1.7 MB

6 Module 7: Defending Against Attacks -- 0 7.1 How to Defend Againt USB Drop Attacks - UA.mp4

6.8 MB

6 Module 7: Defending Against Attacks -- 1 7.2 Analyzing Devices - UA.mp4

7.5 MB

6 Module 7: Defending Against Attacks -- 2 7.3 Red Team Deployments - UA.mp4

7.9 MB

6 Module 7: Defending Against Attacks -- 3 7.4 Summary - UA.mp4

6.4 MB

 

Total files 37


Copyright © 2024 FileMood.com