Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Hack People, Systems and Mobile Devices. Advanced Social Engineering
Introduction
About the intructor (0:30)
What to expect (1:55)
Techniques and Terms (3:53)
Join Our Online Classroom!
Introduction to Ethical Hacking. Footprinting and Reconnaissance
Introduction to Ethical Hacking. Footprinting and Reconnaissance (24:55)
Demo - Information Gathering using Google Dorks and DNS Queris (4:17)
Demo - Scanning and Enumeration (8:58)
Do it yourself - Information Gathering Exercise
Information Gathering
Information Gathering using websites - part 1 (12:59)
Information Gathering using websites - part 2 (17:17)
Introduction to Maltego (4:58)
Maltego Demo (9:16)
Scanning Networks, Enumeration and Discovering Vulnerabilities
Scanning and enumeration (8:58)
Vulnerabilities Identification (8:28)
Demo - Installing Nessus Scanner (3:31)
Demo - Use Nessus to Discover Vulnerabilities (4:42)
Demo - Using Nikto to discover Web Vulnerabilities (4:42)
Demo - Using Paros for Vulnerability Discovery (4:48)
Demo - Use Dirbuster to brute force sub-directories and filenames (2:50)
Do it yourself - Scanning and enumeration, Vulnerability Discovery Exercise
Social Engineering Toolkit (SET)
About Social Engineering Toolkit (1:50)
Use SET to get facebook credentials (6:11)
System Hacking and Vulnerability Exploitation
System hacking - vulnerability exploitation (5:59)
Passwords (11:56)
Authentication (6:55)
Metasploit
Metasploit Introduction (17:08)
Demo - Exploiting FTP Server Vulnerability using Metasploit (11:48)
Demo - Post Exploitation Example (1:07)
Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the Victim PC (10:07)
Demo - Eploiting Samba Service on Linux using Metasploit (3:09)
Do it yourself - Vulnerability Exploitation using Metasploit Exercise
Social Engineering using Metasploit
Backdoor for Windows (14:06)
Android backdoor (6:58)
Trojans, Backdoors, Viruses and Worms
Trojans and Backdoors (5:00)
Computer viruses and worms (9:14)
Cryptography
Cryptography concepts (4:56)
Cryptographic Algorithms (11:09)
Cryptography and cryptanalysis tools. Cryptographic attacks (3:02)
Demo - Hack SSH passwords using Medusa (5:14)
Hack the SSH Password using Hydra (5:05)
Hack Linux Passwords using John the Ripper (3:29)
Do it yourself - Passwords Protection Exercise
Penetration Testing on Wireless Networks
Penetration Testing on Wireless Networks (6:56)
Do it yourself - WiFi Networks Security - practical approach
Case Study – Windows Hosted Network Bug or Feature (10:42)
Web Security
Core Problems - Why Web Security (7:33)
Web Technologies
Preparing the Lab Environment (8:31)
Sniffing. Attacking Authentication and Session Management - Session Hijacking
Sniffing (15:00)
Theoretical Overview of Attacking Authentication and Session Management
Session Hijacking trough Man In The Middle Attack (11:05)
Intercept and access traffic over HTTPS. Get Gmail and Facebook passwords. (8:56)
Attacking the users trough websites - XSS and Beef-XSS
XSS Basics (8:27)
Reflected XSS (10:29)
Stored XSS (6:59)
Beef-XSS Basics (16:12)
Access controls. Data stores and Client-side Controls
Access controls. Data stores and Client-side Controls
SQL injection (9:09)
Exploiting SQLi using Sqlmap and Getting Remote Shell (10:07)
Upload and Remote File Execution (10:43)
Other vulnerabilities - web and mobile
OWASP Top Ten Mobile Vulnerabilities (13:22)
Penetration Testing Cheat Sheet (18:59)
For Developers - Android Security Guidelines (1:21)
Further research - Automatic and Manual Scanning for Vulnerabilities (18:16)
Android Development Tools
Android Studio (11:21)
Android Debug Bridge (6:23)
Playing with Android Emulators - practice your social engineering
Android emulator or Android Device? (6:58)
Android Rooting (5:43)
Setting up a proxy in Android (10:25)
Installing CA Certificate (5:41)
Android Vulnerable Application Setup (3:43)
Android Application Review. Reverse Engineering and App Analysis
APK file Structure. AndroidManifest XML file (7:01)
Reversing to get Source code of the Application - decompiling with dex2jar (10:53)
Reversing and Re-compiling With APKTool (10:55)
Static vs Dynamic Analysis (5:58)
Static Analysis of Android Application using QARK (13:05)
Dynamic Analysis of Android Application using Inspeckage and Xsposed (15:36)
MobSF - Mobile-Security-Framework (10:48)
Automated Security Assessments with Drozer (8:45)
Intercept traffic using Wireshark (5:22)
Intent Sniffing (5:23)
Fuzzing using Burp - Password Brute-Force. Username enumeration (11:58)
Bypass Certificate Pinning
General Description (4:10)
Automatic Bypass of SSL Pinning (8:51)
Manual Bypass of SSL Pinning (31:50)
Final Words
Countermeasures for Social Engineering (6:48)
Final words (0:16)
Information Gathering using websites - part 1
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock