589689.xyz

Udemy - Whitehat Hacking and Penetration

  • 收录时间:2018-02-28 05:24:04
  • 文件大小:1GB
  • 下载次数:172
  • 最近下载:2021-01-15 04:20:45
  • 磁力链接:

文件列表

  1. 03 03. Networking Fundamentals/026 0308 Using Wireshark For Deep Analysis.mp4 25MB
  2. 04 04. Cryptography/035 0407 SSLTLS.mp4 22MB
  3. 01 01. Introduction/006 0107 Methodology.mp4 22MB
  4. 07 07. Malware - Trojans Backdoors Viruses And Worms/072 0710 More Malware Analysis.mp4 22MB
  5. 06 06. Penetration/061 0608 AuditingLogging.mp4 21MB
  6. 08 08. Denial Of Service Attacks/074 0802 DoS Attacks.mp4 20MB
  7. 07 07. Malware - Trojans Backdoors Viruses And Worms/070 0708 Doing Debugging - OllyDbg.mp4 20MB
  8. 03 03. Networking Fundamentals/024 0306 TCP.mp4 20MB
  9. 02 02. Getting The Background - Footprinting And Reconnaissance/011 0202 History Lessons - Way Back Machine.mp4 18MB
  10. 02 02. Getting The Background - Footprinting And Reconnaissance/013 0204 Using Whois Lookups.mp4 18MB
  11. 03 03. Networking Fundamentals/028 0310 Using ARP.mp4 17MB
  12. 06 06. Penetration/059 0606 Spyware Rootkits And Key Loggers.mp4 17MB
  13. 01 01. Introduction/005 0106 Legal Issues Around Hacking.mp4 17MB
  14. 02 02. Getting The Background - Footprinting And Reconnaissance/018 0209 Google Hacking Database.mp4 17MB
  15. 09 09. Web Application Hacking/084 0907 Session Hijacking And Attacks And Cookies.mp4 17MB
  16. 04 04. Cryptography/032 0404 Certificates.mp4 16MB
  17. 03 03. Networking Fundamentals/025 0307 Services.mp4 15MB
  18. 08 08. Denial Of Service Attacks/075 0803 Cyber Crime.mp4 15MB
  19. 05 05. Scanning And Enumeration/049 0511 SNMP.mp4 15MB
  20. 03 03. Networking Fundamentals/027 0309 DHCP.mp4 15MB
  21. 05 05. Scanning And Enumeration/042 0504 Using hping And Its Uses.mp4 15MB
  22. 07 07. Malware - Trojans Backdoors Viruses And Worms/064 0702 Detection Of Malware.mp4 14MB
  23. 08 08. Denial Of Service Attacks/076 0804 Botnets.mp4 14MB
  24. 05 05. Scanning And Enumeration/041 0503 Other Types Of Scans.mp4 14MB
  25. 05 05. Scanning And Enumeration/052 0514 Tor And Anonymizers.mp4 14MB
  26. 03 03. Networking Fundamentals/020 0302 Using Wireshark To Examine Packets.mp4 14MB
  27. 08 08. Denial Of Service Attacks/077 0805 Attack Countermeasures - Flooding.mp4 14MB
  28. 01 01. Introduction/003 0104 Types Of Hacking.mp4 14MB
  29. 02 02. Getting The Background - Footprinting And Reconnaissance/016 0208 Mining For Information Using Google Hacking.mp4 13MB
  30. 05 05. Scanning And Enumeration/047 0509 Using Nessus.mp4 13MB
  31. 05 05. Scanning And Enumeration/039 0501 Types of Scans.mp4 13MB
  32. 06 06. Penetration/062 0609 Metasploit Again.mp4 12MB
  33. 05 05. Scanning And Enumeration/044 0506 IDS Evasion.mp4 12MB
  34. 03 03. Networking Fundamentals/023 0305 UDP.mp4 12MB
  35. 05 05. Scanning And Enumeration/051 0513 Using Proxies.mp4 11MB
  36. 02 02. Getting The Background - Footprinting And Reconnaissance/012 0203 Using Your Resources - Job Listings People Searches Social Networks.mp4 11MB
  37. 05 05. Scanning And Enumeration/048 0510 Enumeration Techniques.mp4 11MB
  38. 07 07. Malware - Trojans Backdoors Viruses And Worms/068 0706 Malware Analysis.mp4 11MB
  39. 04 04. Cryptography/031 0403 Public Key.mp4 11MB
  40. 01 01. Introduction/004 0105 Being Ethical.mp4 11MB
  41. 11 11. Detection Evasion/095 1102 Steganography.mp4 10MB
  42. 03 03. Networking Fundamentals/021 0303 OSI And IP Models.mp4 10MB
  43. 05 05. Scanning And Enumeration/050 0512 LDAP.mp4 10MB
  44. 05 05. Scanning And Enumeration/053 0515 Tunneling.mp4 9MB
  45. 05 05. Scanning And Enumeration/046 0508 Vulnerability Scanning.mp4 9MB
  46. 09 09. Web Application Hacking/078 0901 What Is Web Application Testing.mp4 9MB
  47. 10 10. Wireless Networking/093 1007 Protecting Wireless Networks.mp4 9MB
  48. 02 02. Getting The Background - Footprinting And Reconnaissance/015 0206 Finding Network Ranges.mp4 9MB
  49. 09 09. Web Application Hacking/080 0903 Web Testing Tools.mp4 9MB
  50. 05 05. Scanning And Enumeration/043 0505 War Dialing.mp4 9MB
  51. 05 05. Scanning And Enumeration/045 0507 Banner Grabbing.mp4 9MB
  52. 01 01. Introduction/007 0108 Types Of Attacks.mp4 9MB
  53. 10 10. Wireless Networking/090 1004 Breaking WEP Encryption.mp4 9MB
  54. 09 09. Web Application Hacking/083 0906 Cross Site Request Forgery.mp4 8MB
  55. 09 09. Web Application Hacking/085 0908 Password Attacks.mp4 8MB
  56. 04 04. Cryptography/030 0402 Types Of Cryptography.mp4 8MB
  57. 02 02. Getting The Background - Footprinting And Reconnaissance/014 0205 Using DNS To Extract Information.mp4 8MB
  58. 06 06. Penetration/060 0607 Metasploit Basics.mp4 8MB
  59. 01 01. Introduction/009 0110 What Is Penetration TestingScope.mp4 8MB
  60. 10 10. Wireless Networking/088 1002 Encryption Techniques - WEP WPA WPA2.mp4 8MB
  61. 06 06. Penetration/058 0605 Privilege Escalation.mp4 8MB
  62. 07 07. Malware - Trojans Backdoors Viruses And Worms/066 0704 Deployment Of Malware.mp4 8MB
  63. 09 09. Web Application Hacking/082 0905 SQL Injection.mp4 8MB
  64. 04 04. Cryptography/036 0408 SSH.mp4 8MB
  65. 06 06. Penetration/056 0603 Password Attacks.mp4 7MB
  66. 10 10. Wireless Networking/092 1006 Wireless Sniffing.mp4 7MB
  67. 04 04. Cryptography/029 0401 History Of Cryptography.mp4 7MB
  68. 06 06. Penetration/057 0604 Password Storage Techniques.mp4 7MB
  69. 06 06. Penetration/055 0602 Password Cracking And Complexity.mp4 7MB
  70. 03 03. Networking Fundamentals/019 0301 History Of TCPIP.mp4 7MB
  71. 02 02. Getting The Background - Footprinting And Reconnaissance/017 0207 Google Hacking.mp4 7MB
  72. 12 12. Programming Attacks/097 1202 Buffer Overflows.mp4 7MB
  73. 09 09. Web Application Hacking/081 0904 Cross Site Scripting.mp4 7MB
  74. 10 10. Wireless Networking/089 1003 Finding Hotspots.mp4 7MB
  75. 06 06. Penetration/054 0601 Goals.mp4 6MB
  76. 07 07. Malware - Trojans Backdoors Viruses And Worms/067 0705 Virus Types.mp4 6MB
  77. 10 10. Wireless Networking/091 1005 Rogue Access Points And Attacks.mp4 6MB
  78. 07 07. Malware - Trojans Backdoors Viruses And Worms/069 0707 Windows ADS And Hiding Malware.mp4 6MB
  79. 12 12. Programming Attacks/101 1206 Reverse Engineering.mp4 6MB
  80. 04 04. Cryptography/034 0406 AES DES 3DES.mp4 6MB
  81. 12 12. Programming Attacks/098 1203 Protecting Against Buffer Overflow Attacks.mp4 5MB
  82. 10 10. Wireless Networking/087 1001 Wireless Networking.mp4 5MB
  83. 04 04. Cryptography/037 0409 Disk Encryption.mp4 5MB
  84. 07 07. Malware - Trojans Backdoors Viruses And Worms/071 0709 Packing And Automated AV Maker Tools.mp4 5MB
  85. 12 12. Programming Attacks/099 1204 Format String.mp4 5MB
  86. 04 04. Cryptography/033 0405 Hashing.mp4 5MB
  87. 01 01. Introduction/008 0109 Skills Necessary And Skills To Be Learned.mp4 5MB
  88. 07 07. Malware - Trojans Backdoors Viruses And Worms/063 0701 Definitions And History.mp4 5MB
  89. 05 05. Scanning And Enumeration/040 0502 Using NMAP.mp4 4MB
  90. 07 07. Malware - Trojans Backdoors Viruses And Worms/065 0703 Anti-Virus Evasion.mp4 4MB
  91. 08 08. Denial Of Service Attacks/073 0801 What Is DoS DDoS.mp4 4MB
  92. 09 09. Web Application Hacking/079 0902 Web Application Architecture.mp4 4MB
  93. 12 12. Programming Attacks/100 1205 De-Compilation.mp4 4MB
  94. 02 02. Getting The Background - Footprinting And Reconnaissance/010 0201 What Is Footprinting.mp4 4MB
  95. 04 04. Cryptography/038 0410 Cryptographic Analysis.mp4 4MB
  96. 01 01. Introduction/001 0101 What You Should Expect From The Video.mp4 3MB
  97. 01 01. Introduction/002 0102 What Is Hacking.mp4 3MB
  98. 12 12. Programming Attacks/096 1201 Stacks And Heaps.mp4 3MB
  99. 11 11. Detection Evasion/094 1101 What Is Evasion And Why Do We Use It.mp4 3MB
  100. 09 09. Web Application Hacking/086 0909 Encoding.mp4 3MB
  101. 03 03. Networking Fundamentals/022 0304 Addressing.mp4 2MB
  102. 01 01. Introduction/English Subtitles/009 0110 What Is Penetration TestingScope-EN.srt 13KB
  103. 03 03. Networking Fundamentals/English Subtitles/028 0310 Using ARP-EN.srt 13KB
  104. 03 03. Networking Fundamentals/English Subtitles/027 0309 DHCP-EN.srt 13KB
  105. 08 08. Denial Of Service Attacks/English Subtitles/077 0805 Attack Countermeasures - Flooding-EN.srt 13KB
  106. 05 05. Scanning And Enumeration/English Subtitles/047 0509 Using Nessus-EN.srt 13KB
  107. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/070 0708 Doing Debugging - OllyDbg-EN.srt 13KB
  108. 06 06. Penetration/English Subtitles/054 0601 Goals-EN.srt 13KB
  109. 03 03. Networking Fundamentals/English Subtitles/021 0303 OSI And IP Models-EN.srt 12KB
  110. 03 03. Networking Fundamentals/English Subtitles/026 0308 Using Wireshark For Deep Analysis-EN.srt 12KB
  111. 05 05. Scanning And Enumeration/English Subtitles/049 0511 SNMP-EN.srt 12KB
  112. 03 03. Networking Fundamentals/English Subtitles/024 0306 TCP-EN.srt 12KB
  113. 04 04. Cryptography/English Subtitles/032 0404 Certificates-EN.srt 12KB
  114. 05 05. Scanning And Enumeration/English Subtitles/045 0507 Banner Grabbing-EN.srt 12KB
  115. 10 10. Wireless Networking/English Subtitles/089 1003 Finding Hotspots-EN.srt 11KB
  116. 01 01. Introduction/English Subtitles/007 0108 Types Of Attacks-EN.srt 11KB
  117. 05 05. Scanning And Enumeration/English Subtitles/050 0512 LDAP-EN.srt 11KB
  118. 05 05. Scanning And Enumeration/English Subtitles/039 0501 Types of Scans-EN.srt 11KB
  119. 12 12. Programming Attacks/English Subtitles/098 1203 Protecting Against Buffer Overflow Attacks-EN.srt 11KB
  120. 06 06. Penetration/English Subtitles/061 0608 AuditingLogging-EN.srt 11KB
  121. 06 06. Penetration/English Subtitles/059 0606 Spyware Rootkits And Key Loggers-EN.srt 10KB
  122. 04 04. Cryptography/English Subtitles/029 0401 History Of Cryptography-EN.srt 10KB
  123. 04 04. Cryptography/English Subtitles/035 0407 SSLTLS-EN.srt 10KB
  124. 01 01. Introduction/English Subtitles/006 0107 Methodology-EN.srt 10KB
  125. 12 12. Programming Attacks/English Subtitles/097 1202 Buffer Overflows-EN.srt 10KB
  126. 09 09. Web Application Hacking/English Subtitles/084 0907 Session Hijacking And Attacks And Cookies-EN.srt 10KB
  127. 08 08. Denial Of Service Attacks/English Subtitles/075 0803 Cyber Crime-EN.srt 10KB
  128. 06 06. Penetration/English Subtitles/055 0602 Password Cracking And Complexity-EN.srt 10KB
  129. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/014 0205 Using DNS To Extract Information-EN.srt 10KB
  130. 05 05. Scanning And Enumeration/English Subtitles/041 0503 Other Types Of Scans-EN.srt 10KB
  131. 10 10. Wireless Networking/English Subtitles/093 1007 Protecting Wireless Networks-EN.srt 10KB
  132. 08 08. Denial Of Service Attacks/English Subtitles/076 0804 Botnets-EN.srt 10KB
  133. 01 01. Introduction/English Subtitles/008 0109 Skills Necessary And Skills To Be Learned-EN.srt 9KB
  134. 04 04. Cryptography/English Subtitles/030 0402 Types Of Cryptography-EN.srt 9KB
  135. 03 03. Networking Fundamentals/English Subtitles/019 0301 History Of TCPIP-EN.srt 9KB
  136. 05 05. Scanning And Enumeration/English Subtitles/048 0510 Enumeration Techniques-EN.srt 9KB
  137. 05 05. Scanning And Enumeration/English Subtitles/044 0506 IDS Evasion-EN.srt 9KB
  138. 05 05. Scanning And Enumeration/English Subtitles/042 0504 Using hping And Its Uses-EN.srt 9KB
  139. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/013 0204 Using Whois Lookups-EN.srt 9KB
  140. 01 01. Introduction/English Subtitles/005 0106 Legal Issues Around Hacking-EN.srt 9KB
  141. 10 10. Wireless Networking/English Subtitles/088 1002 Encryption Techniques - WEP WPA WPA2-EN.srt 9KB
  142. 05 05. Scanning And Enumeration/English Subtitles/053 0515 Tunneling-EN.srt 9KB
  143. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/064 0702 Detection Of Malware-EN.srt 9KB
  144. 06 06. Penetration/English Subtitles/056 0603 Password Attacks-EN.srt 9KB
  145. 04 04. Cryptography/English Subtitles/036 0408 SSH-EN.srt 9KB
  146. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/067 0705 Virus Types-EN.srt 9KB
  147. 05 05. Scanning And Enumeration/English Subtitles/046 0508 Vulnerability Scanning-EN.srt 9KB
  148. 10 10. Wireless Networking/English Subtitles/090 1004 Breaking WEP Encryption-EN.srt 8KB
  149. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/072 0710 More Malware Analysis-EN.srt 8KB
  150. 01 01. Introduction/English Subtitles/003 0104 Types Of Hacking-EN.srt 8KB
  151. 06 06. Penetration/English Subtitles/058 0605 Privilege Escalation-EN.srt 8KB
  152. 03 03. Networking Fundamentals/English Subtitles/020 0302 Using Wireshark To Examine Packets-EN.srt 8KB
  153. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/068 0706 Malware Analysis-EN.srt 8KB
  154. 08 08. Denial Of Service Attacks/English Subtitles/074 0802 DoS Attacks-EN.srt 8KB
  155. 03 03. Networking Fundamentals/English Subtitles/025 0307 Services-EN.srt 8KB
  156. 03 03. Networking Fundamentals/English Subtitles/023 0305 UDP-EN.srt 8KB
  157. 05 05. Scanning And Enumeration/English Subtitles/051 0513 Using Proxies-EN.srt 8KB
  158. 04 04. Cryptography/English Subtitles/033 0405 Hashing-EN.srt 8KB
  159. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/011 0202 History Lessons - Way Back Machine-EN.srt 7KB
  160. 09 09. Web Application Hacking/English Subtitles/085 0908 Password Attacks-EN.srt 7KB
  161. 09 09. Web Application Hacking/English Subtitles/080 0903 Web Testing Tools-EN.srt 7KB
  162. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/069 0707 Windows ADS And Hiding Malware-EN.srt 7KB
  163. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/015 0206 Finding Network Ranges-EN.srt 7KB
  164. 09 09. Web Application Hacking/English Subtitles/079 0902 Web Application Architecture-EN.srt 7KB
  165. 04 04. Cryptography/English Subtitles/034 0406 AES DES 3DES-EN.srt 7KB
  166. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/012 0203 Using Your Resources - Job Listings People Searches Social Networks-EN.srt 7KB
  167. 09 09. Web Application Hacking/English Subtitles/078 0901 What Is Web Application Testing-EN.srt 7KB
  168. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/018 0209 Google Hacking Database-EN.srt 7KB
  169. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/066 0704 Deployment Of Malware-EN.srt 7KB
  170. 11 11. Detection Evasion/English Subtitles/095 1102 Steganography-EN.srt 7KB
  171. 10 10. Wireless Networking/English Subtitles/091 1005 Rogue Access Points And Attacks-EN.srt 7KB
  172. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/016 0208 Mining For Information Using Google Hacking-EN.srt 7KB
  173. 05 05. Scanning And Enumeration/English Subtitles/052 0514 Tor And Anonymizers-EN.srt 7KB
  174. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/063 0701 Definitions And History-EN.srt 7KB
  175. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/010 0201 What Is Footprinting-EN.srt 7KB
  176. 12 12. Programming Attacks/English Subtitles/099 1204 Format String-EN.srt 7KB
  177. 10 10. Wireless Networking/English Subtitles/087 1001 Wireless Networking-EN.srt 7KB
  178. 12 12. Programming Attacks/English Subtitles/096 1201 Stacks And Heaps-EN.srt 7KB
  179. 06 06. Penetration/English Subtitles/060 0607 Metasploit Basics-EN.srt 7KB
  180. 12 12. Programming Attacks/English Subtitles/101 1206 Reverse Engineering-EN.srt 6KB
  181. 08 08. Denial Of Service Attacks/English Subtitles/073 0801 What Is DoS DDoS-EN.srt 6KB
  182. 01 01. Introduction/English Subtitles/001 0101 What You Should Expect From The Video-EN.srt 6KB
  183. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/065 0703 Anti-Virus Evasion-EN.srt 6KB
  184. 09 09. Web Application Hacking/English Subtitles/082 0905 SQL Injection-EN.srt 6KB
  185. 09 09. Web Application Hacking/English Subtitles/083 0906 Cross Site Request Forgery-EN.srt 6KB
  186. 10 10. Wireless Networking/English Subtitles/092 1006 Wireless Sniffing-EN.srt 6KB
  187. 06 06. Penetration/English Subtitles/057 0604 Password Storage Techniques-EN.srt 6KB
  188. 04 04. Cryptography/English Subtitles/031 0403 Public Key-EN.srt 6KB
  189. 12 12. Programming Attacks/English Subtitles/100 1205 De-Compilation-EN.srt 6KB
  190. 04 04. Cryptography/English Subtitles/037 0409 Disk Encryption-EN.srt 6KB
  191. 11 11. Detection Evasion/English Subtitles/094 1101 What Is Evasion And Why Do We Use It-EN.srt 6KB
  192. 09 09. Web Application Hacking/English Subtitles/081 0904 Cross Site Scripting-EN.srt 6KB
  193. 05 05. Scanning And Enumeration/English Subtitles/043 0505 War Dialing-EN.srt 6KB
  194. 05 05. Scanning And Enumeration/English Subtitles/040 0502 Using NMAP-EN.srt 5KB
  195. 06 06. Penetration/English Subtitles/062 0609 Metasploit Again-EN.srt 5KB
  196. 02 02. Getting The Background - Footprinting And Reconnaissance/English Subtitles/017 0207 Google Hacking-EN.srt 5KB
  197. 09 09. Web Application Hacking/English Subtitles/086 0909 Encoding-EN.srt 5KB
  198. 01 01. Introduction/English Subtitles/004 0105 Being Ethical-EN.srt 5KB
  199. 01 01. Introduction/English Subtitles/002 0102 What Is Hacking-EN.srt 5KB
  200. 04 04. Cryptography/English Subtitles/038 0410 Cryptographic Analysis-EN.srt 5KB
  201. 07 07. Malware - Trojans Backdoors Viruses And Worms/English Subtitles/071 0709 Packing And Automated AV Maker Tools-EN.srt 4KB
  202. 03 03. Networking Fundamentals/English Subtitles/022 0304 Addressing-EN.srt 4KB
  203. 09 09. Web Application Hacking/Información.txt 233B
  204. 07 07. Malware - Trojans Backdoors Viruses And Worms/Información.txt 233B
  205. Información.txt 233B
  206. 06 06. Penetration/Información.txt 233B
  207. 10 10. Wireless Networking/Información.txt 233B
  208. 02 02. Getting The Background - Footprinting And Reconnaissance/Información.txt 233B
  209. www.intercambiosvirtuales.org - cursos-multimedia.url 152B
  210. 10 10. Wireless Networking/www.intercambiosvirtuales.org - cursos-multimedia.url 152B
  211. 06 06. Penetration/www.intercambiosvirtuales.org - cursos-multimedia.url 152B
  212. 09 09. Web Application Hacking/www.intercambiosvirtuales.org - cursos-multimedia.url 152B
  213. 07 07. Malware - Trojans Backdoors Viruses And Worms/www.intercambiosvirtuales.org - cursos-multimedia.url 152B
  214. 02 02. Getting The Background - Footprinting And Reconnaissance/www.intercambiosvirtuales.org - cursos-multimedia.url 152B
  215. 06 06. Penetration/www.intercambiosvirtuales.org.url 126B
  216. 07 07. Malware - Trojans Backdoors Viruses And Worms/www.intercambiosvirtuales.org.url 126B
  217. www.intercambiosvirtuales.org.url 126B
  218. 10 10. Wireless Networking/www.intercambiosvirtuales.org.url 126B
  219. 09 09. Web Application Hacking/www.intercambiosvirtuales.org.url 126B
  220. 02 02. Getting The Background - Footprinting And Reconnaissance/www.intercambiosvirtuales.org.url 126B
  221. 07 07. Malware - Trojans Backdoors Viruses And Worms/Foro de Ayuda Intercambiosvirtuales.url 115B
  222. Foro de Ayuda Intercambiosvirtuales.url 115B
  223. 09 09. Web Application Hacking/Foro de Ayuda Intercambiosvirtuales.url 115B
  224. 10 10. Wireless Networking/Foro de Ayuda Intercambiosvirtuales.url 115B
  225. 06 06. Penetration/Foro de Ayuda Intercambiosvirtuales.url 115B
  226. 02 02. Getting The Background - Footprinting And Reconnaissance/Foro de Ayuda Intercambiosvirtuales.url 115B