Ethical Hacking Mobile Devices and Platforms\04 - iOS\03 - Jailbreaking for command-line access.mp4
[5284bd52312d6188]
|
19,590,495 |
DB4AE0F4 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\01 - iOS applications and vulnerabilities.srt |
7,684 |
C123DA53 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\05 - Extracting properties and class headers.mp4
[7bd9c6f3000e3231]
|
17,208,303 |
2F3209AA |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\06 - Disassembling iOS executable code.mp4
[686805140ddf6a9a]
|
20,221,409 |
E86B8C6A |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\06 - Disassembling iOS executable code.srt |
9,916 |
893F9232 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\01 - iOS applications and vulnerabilities.mp4
[fed3165c4a4b99ba]
|
11,267,239 |
C6CE478B |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\04 - Preparing to test iOS applications.srt |
6,281 |
CC10754F |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\03 - Jailbreaking for command-line access.srt |
10,668 |
AB9895BD |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\02 - Securing iOS applications by design.srt |
8,329 |
A16FFBE0 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\02 - Securing iOS applications by design.mp4
[b8bfd06737c1c64c]
|
11,756,981 |
5C59D2B7 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\05 - Extracting properties and class headers.srt |
8,248 |
61E0D7D2 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\07 - Advancing into dynamic analysis of iOS.srt |
9,828 |
DD040430 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\07 - Advancing into dynamic analysis of iOS.mp4
[fac8b1539882dd42]
|
20,168,664 |
813E7415 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS\04 - Preparing to test iOS applications.mp4
[8ccfe6b44ccfabe4]
|
10,260,737 |
816D0051 |
Ethical Hacking Mobile Devices and Platforms\02 - Mobile Technology\02 - Static analysis of applications.mp4
[8c4fb07300ce55e9]
|
9,962,500 |
D26A9521 |
Ethical Hacking Mobile Devices and Platforms\02 - Mobile Technology\02 - Static analysis of applications.srt |
11,190 |
721B6537 |
Ethical Hacking Mobile Devices and Platforms\02 - Mobile Technology\01 - Understand and test for mobile vulnerabilities.srt |
10,806 |
3F7B6E87 |
Ethical Hacking Mobile Devices and Platforms\02 - Mobile Technology\01 - Understand and test for mobile vulnerabilities.mp4
[50ed215159a8761b]
|
13,277,355 |
604F51C2 |
Ethical Hacking Mobile Devices and Platforms\02 - Mobile Technology\03 - Dynamic analysis of applications.mp4
[78f542bd93dd507c]
|
3,632,135 |
D4C4D18B |
Ethical Hacking Mobile Devices and Platforms\02 - Mobile Technology\03 - Dynamic analysis of applications.srt |
4,020 |
56F96C56 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\03 - Preparing for Android testing.mp4
[713d3ab2e0077ad5]
|
6,668,121 |
47AA6C49 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\03 - Preparing for Android testing.srt |
2,070 |
17798A65 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\09 - Install an Android emulator from the SDK.srt |
2,637 |
30F28CDF |
Ethical Hacking Mobile Devices and Platforms\03 - Android\12 - Setting up a KitKat VM.mp4
[331e7b093c3b4754]
|
13,165,738 |
43E91D36 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\02 - Android security model.mp4
[12e7ed917fdb19c9]
|
5,881,685 |
99DDBDF0 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\12 - Setting up a KitKat VM.srt |
6,177 |
D63B72BF |
Ethical Hacking Mobile Devices and Platforms\03 - Android\11 - Using Drozer to analyze applications.mp4
[8d17fae3e76deb3]
|
12,813,317 |
664FFF79 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\11 - Using Drozer to analyze applications.srt |
7,310 |
09A65A0E |
Ethical Hacking Mobile Devices and Platforms\03 - Android\10 - Dynamic analysis of Android applications.mp4
[9b57ec9d85d62f70]
|
17,825,114 |
31CD7A78 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\07 - Browsing applications directly with JADX.mp4
[a37366bdc2b6f76]
|
8,029,016 |
46667532 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\06 - Recreating Java source code with JAD.mp4
[54dd52b0f7d44d2a]
|
6,131,378 |
8E148352 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\04 - Extracting and reading the manifest file.srt |
7,907 |
487E4C47 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\08 - Getting command-line access with ADB.mp4
[a60497b00dab2792]
|
12,902,405 |
2A0FDD5E |
Ethical Hacking Mobile Devices and Platforms\03 - Android\05 - Extracting and reading JavaScript code.srt |
6,067 |
92939A5C |
Ethical Hacking Mobile Devices and Platforms\03 - Android\01 - Understanding the Android operating system.mp4
[5d37bfb3e8dffdb3]
|
12,230,148 |
D67BFCDC |
Ethical Hacking Mobile Devices and Platforms\03 - Android\08 - Getting command-line access with ADB.srt |
8,801 |
F3AC8107 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\02 - Android security model.srt |
6,234 |
E7199E48 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\07 - Browsing applications directly with JADX.srt |
2,585 |
067CA7B9 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\09 - Install an Android emulator from the SDK.mp4
[8a1e3167585feb15]
|
4,842,331 |
5E1265C1 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\01 - Understanding the Android operating system.srt |
10,527 |
7FA0FD92 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\05 - Extracting and reading JavaScript code.mp4
[445a951baeed3bc6]
|
14,780,245 |
F55ABB89 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\10 - Dynamic analysis of Android applications.srt |
8,146 |
B1C069D8 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\06 - Recreating Java source code with JAD.srt |
2,585 |
3CBA1BD3 |
Ethical Hacking Mobile Devices and Platforms\03 - Android\04 - Extracting and reading the manifest file.mp4
[446d08604651312c]
|
24,422,404 |
B1F2D640 |
Ethical Hacking Mobile Devices and Platforms\06 - Conclusion\01 - Next steps.mp4
[510bf0243f0ad180]
|
3,751,428 |
7D3B291A |
Ethical Hacking Mobile Devices and Platforms\06 - Conclusion\01 - Next steps.srt |
2,346 |
320B85D5 |
Ethical Hacking Mobile Devices and Platforms\Exercise Files\Ex_Files_Ethical_Hacking_Mobile_Devices.zip |
33,815 |
988AA6F2 |
Ethical Hacking Mobile Devices and Platforms\05 - Other Operating Systems\01 - HarmonyOS To be or not to be.srt |
3,415 |
AEA8578A |
Ethical Hacking Mobile Devices and Platforms\05 - Other Operating Systems\01 - HarmonyOS To be or not to be.mp4
[c22f9d884c39dfa5]
|
3,179,180 |
657D4716 |
Ethical Hacking Mobile Devices and Platforms\01 - Introduction\03 - Course disclaimer.mp4
[719293ef105a5e99]
|
1,631,575 |
47E6DABD |
Ethical Hacking Mobile Devices and Platforms\01 - Introduction\02 - Before watching this course.mp4
[75b9ecdd738b42b4]
|
1,176,408 |
2DBFC8E6 |
Ethical Hacking Mobile Devices and Platforms\01 - Introduction\03 - Course disclaimer.srt |
2,116 |
F4D5C21C |
Ethical Hacking Mobile Devices and Platforms\01 - Introduction\01 - What your mobile applications are really doing.mp4
[576fa72357576f90]
|
9,166,251 |
E0772C05 |
Ethical Hacking Mobile Devices and Platforms\01 - Introduction\02 - Before watching this course.srt |
1,249 |
7BC41AC5 |
Ethical Hacking Mobile Devices and Platforms\01 - Introduction\01 - What your mobile applications are really doing.srt |
1,777 |
66A95800 |
Ethical Hacking Mobile Devices and Platforms\04 - iOS |
0 |
00000000 |
Ethical Hacking Mobile Devices and Platforms\02 - Mobile Technology |
0 |
00000000 |
Ethical Hacking Mobile Devices and Platforms\03 - Android |
0 |
00000000 |
Ethical Hacking Mobile Devices and Platforms\06 - Conclusion |
0 |
00000000 |
Ethical Hacking Mobile Devices and Platforms\Exercise Files |
0 |
00000000 |
Ethical Hacking Mobile Devices and Platforms\05 - Other Operating Systems |
0 |
00000000 |
Ethical Hacking Mobile Devices and Platforms\01 - Introduction |
0 |
00000000 |
Ethical Hacking Mobile Devices and Platforms |
0 |
00000000 |
|
Total size: |
296,145,296 |
|