Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Hacking Windows 10 Using Metasploit From Scratch
Introduction
Course Outline (2:20)
Preparing
Installing Kali Linux 2.0 as ISO image (6:10)
Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox) (4:52)
Installing Kali Linux 2.0 as a Virtual Machine (VMware) (2:37)
Setup Windows 10 as a Virtual Machine (2:27)
Setup Metasploitable as a Virtual Machine (2:24)
Configure the Network Settings (4:46)
Connecting Wi-Fi card to the Virtual Machine (1:29)
Updating Kali Linux 2.0
Information Gathering
Introduction (1:21)
Discovering the connected clients (4:13)
Scanning the target OS (Part 1) (13:11)
Scanning the target OS (Part 2) (8:19)
Scanning the target OS using GUI (6:06)
Gaining Access
Gaining Access introduction (1:03)
Metaasploit Fundmentals (12:29)
Creating a Payload using Msfvenom (6:05)
Creating an Encoded Payload using Msfvenom (5:59)
Testing the payload in the target OS (7:26)
Encoding and Combining the Payload
Introduction (0:47)
Installing Veil Framework (3:38)
Creating an undetectable payload (7:45)
Combine an EXE file with the Payload (1st method) (8:39)
Combine an EXE file with the Payload (2nd method) (5:58)
Combine the Payload with an Image,PDF,MP3 etc.... (11:40)
Combine the Payload with an Excel, Word file (9:19)
Spoofing the Backdoor extension (7:09)
Post Exploitation
Introduction (0:54)
Interact with the Target Computer (Part 1) (6:29)
Interact with the Target Computer (Part 2) (6:11)
Persist your connection in the target OS (7:46)
Escalate your privileges in Windows 10 (7:22)
Escalate your privileges in Windows 8.1/8/7 (5:18)
Migrating the backdoor with system processes (7:53)
Check the virtualization & Clear log event (5:54)
Uninstalling programs from the target OS (5:18)
Add/Remove users and changing the Admin password (5:55)
What is Pivoting? (10:44)
Pivot from the Victim System to Own Every Device on the Network (1st Case) (10:35)
Pivot from the Victim System to Own Every Device on the Network (2nd Case) (12:24)
Stealing the target Wi-Fi password (8:05)
Capture the keystrokes of the target keyboard (6:57)
Stealing Windows Credentials (6:33)
Cracking the administrator password (8:47)
Stealing the stored passwords & Visited websites (9:50)
Recover the deleted files from the target OS (8:01)
Enumerate USB Drive history (2:19)
Redirect the target from to any website (16:13)
Downloading files using Windows PowerShell (16:13)
Hooking with BeEF
Introduction (0:54)
Hooking the target browser with BeEF (12:04)
Play any sound in the target browser (9:28)
Capture a screenshot from the target browser (2:46)
Redirect the target to any website (5:44)
Run any YouTube video in the target browser (4:20)
Stealing the target online accounts with BeEF (5:48)
Integrate Metasploit framework with BeEF Project (8:31)
Having some Fun with BeEF (8:27)
Hacking the target Windows OS through the hooked browser (8:58)
Perform the previous attacks over WAN Network
Introduciton (1:17)
Configuring the router and port forwarding (1st method) (9:16)
Configure the Backdoor (5:29)
Port forwarding using VPS SSH tunnel (2nd method) (14:26)
Configure BeEF over WAN network (5:52)
Protection & Detection
Detect & Kill any Meterpreter session (6:14)
Detect the running backdoor manually (9:59)
Detecting the combined backdoor with an image,pdf etc.... (1:46)
Detecting the combined backdoor (MD5 hash) (4:22)
Encrypting your keyboard keystrokes (5:54)
Analyzing the network connections (6:38)
Analyze the running processes (4:03)
Detecting the backdoor using sandbox (4:15)
Compromising any Windows OS just by plugging a USB stick (Bouns Section)
Demonstration (2:02)
The Theory (1:21)
The needed hardware and software (7:47)
Installing the needed software (3:42)
Converting the commands to Arduino script (C/C++) (10:26)
Change the administrator password and force him to sign out (17:15)
Fully control any Windows OS within 2 seconds (15:34)
Installing the needed software
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock