~Get Your Files Here !/04 - Introduction to wireless networks/006 Wireless network interface cards in Linux.mp48.03MB
~Get Your Files Here !/05 - Wireless security (half) measures An overview/002 Changing the MAC address of the wireless network card.mp416.31MB
~Get Your Files Here !/05 - Wireless security (half) measures An overview/004 Finding a hidden access point with disabled ESSID broadcast.mp415.37MB
~Get Your Files Here !/06 - Wireless network attacks independent of used encryption/004 The use of deauthentication attack for jamming network traffic.mp414.56MB
~Get Your Files Here !/07 - WEP attacks/004 The overview and demonstration of the chop-chop attack.mp413.77MB
~Get Your Files Here !/07 - WEP attacks/006 Generating packets without knowing the network key.mp414.09MB
~Get Your Files Here !/07 - WEP attacks/007 Interactive packet replay and ARP request replay.mp420.11MB
~Get Your Files Here !/07 - WEP attacks/008 The demonstration of the PTW and KoreK attacks.mp412MB
~Get Your Files Here !/07 - WEP attacks/010 Creating a fake access point – the Caffe Latte attack.mp49.91MB
~Get Your Files Here !/08 - WPA attacks/003 The dictionary attack on WPA.mp412.34MB
~Get Your Files Here !/08 - WPA attacks/006 The dictionary attack on WPA – using hash tables.mp48.91MB
~Get Your Files Here !/09 - CUDA-powered attacks/002 CUDA – the initial preparation of the environment.mp47.22MB
~Get Your Files Here !/09 - CUDA-powered attacks/003 The installation of CUDA-SDK and CUDA-Toolkit.mp414.63MB
~Get Your Files Here !/09 - CUDA-powered attacks/004 The compilation and installation of the tools with CUDA support.mp428.41MB
~Get Your Files Here !/09 - CUDA-powered attacks/005 The optimization of the parameters of an nVidia video card.mp419.45MB
~Get Your Files Here !/09 - CUDA-powered attacks/006 CUDA – preparation for the attack.mp49.44MB
~Get Your Files Here !/09 - CUDA-powered attacks/007 CUDA – the attack on WPA.mp435.56MB
~Get Your Files Here !/09 - CUDA-powered attacks/008 Generating your own dictionary.mp49.01MB
~Get Your Files Here !/09 - CUDA-powered attacks/009 Applications for cracking MD4 and MD5 hashes with the use of CUDA technology.mp420.73MB
~Get Your Files Here !/13 - Rootkits and Stealth Apps Creating and Revealing v2.0 course/001 Writing a shellcode.mp4179.88MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/001 Become CISS Certified Hacking Training Monitoring - What you will learn.mp44.85MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/002 Become CISS Certified Hacking Training Monitoring Transmitted Data.mp4261.49MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/003 Become CISS Certified Hacking Training WiFi Security - What you will learn.mp44.52MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/004 Become CISS Certified Hacking Training WiFi Security - Overview and sol.mp4137.09MB
~Get Your Files Here !/14 - BONUS section - get your coupon code here/005 Become CISS Certified Hacking Training WiFi Security - Threats.mp489.59MB