RAR-files |
linkedin.learning.ethical.hacking.mobile.devices.and.platforms.update.20220112-xqzt.rar |
50,000,000 |
AD888D5F |
linkedin.learning.ethical.hacking.mobile.devices.and.platforms.update.20220112-xqzt.r00 |
50,000,000 |
FF493B71 |
linkedin.learning.ethical.hacking.mobile.devices.and.platforms.update.20220112-xqzt.r01 |
50,000,000 |
FDB51156 |
linkedin.learning.ethical.hacking.mobile.devices.and.platforms.update.20220112-xqzt.r02 |
50,000,000 |
76971745 |
linkedin.learning.ethical.hacking.mobile.devices.and.platforms.update.20220112-xqzt.r03 |
50,000,000 |
595F374D |
linkedin.learning.ethical.hacking.mobile.devices.and.platforms.update.20220112-xqzt.r04 |
50,000,000 |
218A1B83 |
linkedin.learning.ethical.hacking.mobile.devices.and.platforms.update.20220112-xqzt.r05 |
10,389,688 |
D4B73987 |
|
Total size: |
310,389,688 |
|
|
Archived
files |
01.01-keeping_your_mobile_devices_safe.mkv
[64356e6d3670a739]
|
13,304,806 |
EC72F53D |
01.02-before_watching_this_course.mkv
[f50f9162da7d00e2]
|
1,123,402 |
8A49B0A0 |
01.03-course_disclaimer.mkv
[b79977ba589023a8]
|
1,556,628 |
B3383015 |
02.01-understand_and_test_for_mobile_vulnerabilities.mkv
[85c777a6f90f6727]
|
12,762,371 |
CCC9E98C |
02.02-static_analysis_of_applications.mkv
[da1977bc94ad3464]
|
9,501,843 |
6AE6BD86 |
02.03-dynamic_analysis_of_applications.mkv
[b0b1317c6c2439ab]
|
3,454,542 |
DD9570AA |
02.04-mobile_web_testing.mkv
[e7cf73b0cceef185]
|
1,791,168 |
5A437029 |
03.01-understanding_the_android_operating_system.mkv
[205c72e9b8a6c702]
|
12,890,432 |
8DE0A5A2 |
03.02-android_security_model.mkv
[450208d14857f7c7]
|
5,601,198 |
FBA62CD1 |
03.03-preparing_for_android_testing.mkv
[ed5647b089f90e73]
|
6,551,845 |
9337AA8B |
03.04-extracting_and_reading_the_manifest_file.mkv
[5da198e2c57c57aa]
|
23,867,763 |
DAF1F165 |
03.05-extracting_and_reading_javascript_code.mkv
[b7ae4af9b1e33661]
|
14,391,588 |
BA3BB0A2 |
03.06-recreating_java_source_code_with_jad.mkv
[c810efd886076cc]
|
5,954,242 |
1E18C55D |
03.07-browsing_applications_directly_with_jadx.mkv
[569bde7882f62]
|
7,885,584 |
F82BC154 |
03.08-getting_command-line_access_with_adb.mkv
[a4d5d296cb205091]
|
12,501,370 |
57BB664B |
03.09-install_an_android_emulator_from_the_sdk.mkv
[f724138b4b5b2e13]
|
4,680,002 |
8ECE9663 |
03.10-dynamic_analysis_of_android_applications.mkv
[149ee8f75b76516b]
|
17,406,309 |
4FF2AA74 |
03.11-using_drozer_to_analyze_applications.mkv
[61c162d479ab2536]
|
12,452,438 |
4864C512 |
03.12-checking_for_scam_phones.mkv
[ffc5dba6e3effd8d]
|
7,030,676 |
E49586B7 |
04.01-ios_applications_and_vulnerabilities.mkv
[448ea1b7ccd0b3a4]
|
11,130,829 |
B87ED8A0 |
04.02-securing_ios_applications_by_design.mkv
[7712d8ca8b3d2ccb]
|
11,615,144 |
B0DFED8A |
04.03-jailbreaking_for_command-line_access.mkv
[e13c60f67ae24565]
|
19,395,077 |
A8BA77B9 |
04.04-preparing_to_test_ios_applications.mkv
[8ef3e5da47b53e67]
|
10,151,003 |
34F8CD50 |
04.05-extracting_properties_and_class_headers.mkv
[a829b674657e79f9]
|
17,050,278 |
5794BAA5 |
04.06-disassembling_ios_executable_code.mkv
[d90caf278dc57273]
|
20,059,801 |
102FF4D8 |
04.07-advancing_into_dynamic_analysis_of_ios.mkv
[fd212a380fe35a1a]
|
19,983,714 |
F9191633 |
05.01-taking_a_look_at_security_shepherd.mkv
[19a1652a29706b12]
|
7,409,109 |
6CE78379 |
05.02-watching_for_bad_cryptography.mkv
[a20d80013b407eae]
|
8,372,346 |
B6126960 |
05.03-insecure_data_when_in_developer_mode.mkv
[68b02355fc1888f8]
|
6,829,288 |
89F44AA2 |
06.01-next_steps.mkv
[c43fe85a8be67571]
|
3,647,814 |
021B2909 |
Ex_Files_Ethical_Hacking_Mobile_Devices.zip |
33,815 |
988AA6F2 |
|
Total size: |
310,386,425 |
|
|