Some Tutorials in Computer Networking Hacking Audiobook By Dr. Hidaia Mahmood Alassouli cover art

Some Tutorials in Computer Networking Hacking

Virtual Voice Sample

Try for $0.00
Access a growing selection of included Audible Originals, audiobooks, and podcasts.
You will get an email reminder before your trial ends.
Audible Plus auto-renews for $7.95/mo after 30 days. Upgrade or cancel anytime.

Some Tutorials in Computer Networking Hacking

By: Dr. Hidaia Mahmood Alassouli
Narrated by: Virtual Voice
Try for $0.00

$7.95 a month after 30 days. Cancel anytime.

Buy for $14.99

Buy for $14.99

Confirm purchase
Pay using card ending in
By confirming your purchase, you agree to Audible's Conditions of Use and Amazon's Privacy Notice. Taxes where applicable.
Cancel
Background images

This title uses virtual voice narration

Virtual voice is computer-generated narration for audiobooks.

About this listen

The objective of this work is to provide some quick tutorials in computer networking hacking. The work includes the following tutorials: • Tutorial 1: Setting Up Penetrating Tutorial in Linux. • Tutorial 2: Setting Up Penetrating Tutorial in Windows. • Tutorial 3: OS Command Injection: • Tutorial 4: Basic SQL Injection Commands. • Tutorial 5: Manual SQL injection using order by and union select technique. • Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection. • Tutorial 7: Uploading Shell in the Site having LFI. • Tutorial 8: Advanced Way for Uploading Shell • Tutorial 9: Uploading shell Using Sqli Command. • Tutorial 10: Uploading Shell Using SQLmap • Tutorial 11: Post Based SQL Injection • Tutorial 12: Cracking the Hashes Using Hashcat. • Tutorial 13: Hacking windows 7 and 8 through Metasploite • Tutorial 14: Tutorial on Cross Site Scripting • Tutorial 15: Hacking Android Mobile Using Metasploit • Tutorial 16: Man of the middle attack: • Tutorial 17: Using SQLmap for SQL injection • Tutorial 18: Hide Your Ip • Tutorial 19: Uploading Shell and Payloads Using SQLmap • Tutorial 20: Using Sql Shell in SQLmap • Tutorial 21: Blind SQL Injection • Tutorial 22: Jack Hridoy SQL Injection Solution • Tutorial 23: Using Hydra to Get the PasswordTutorial 24: Finding the phpmyadmin page using websploit. • Tutorial 25: How to root the server using back connect • Tutorial 25: How to root the server using back connect • Tutorial 26: HTML Injection • Tutorial 27: Tutuorial in manual SQl Injection • Tutorial 28: Venom psh-cmd-exe payload • Tutorial 29: Cross site Request Forgery (CSRF) • Tutorial 30: Disable Victim Computer • Tutorial 31: Exploit any firefox by xpi_bootstrapped addon • Tutorial 32: Hack android mobile with metasploit • Tutorial 33: PHP Code Injection to Meterpreter Session • Tutorial 34: Basic google operators • Tutorial 35: Hacking Credit Cards with google • Tutorial 36: Finding Vulnerable Websites in Google • Tutorial 37: Using the httrack to download website • Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper • Tutorial 39: Using burp suite to brute force password
adbl_web_global_use_to_activate_webcro768_stickypopup

What listeners say about Some Tutorials in Computer Networking Hacking

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.