Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Social Engineering From Scratch
Introduction
Teaser - Hacking An Android Phone & Accessing The Camera (5:36)
Introduction to Social Engineering (3:14)
Course Overview (4:16)
Preparation - Creating a Penetration Testing Lab
Lab Overview & Needed Software (7:48)
Installing Kali 2020 As a Virtual Machine Using a Ready Image (10:34)
Installing Windows As a Virtual Machine (3:22)
Installing Ubuntu As a Virtual Machine (7:05)
Preparation - Linux Basics
Basic Overview Of Kali Linux (5:10)
The Linux Terminal & Basic Linux Commands (9:07)
Creating & Using Snapshots (5:36)
Information Gathering
Introduction (1:52)
Information Gathering - Gathering Info About A Company/Website
Maltego Overview (6:02)
Discovering Domain Info & Emails Associated With Target (7:24)
Discovering Information About Hosting Company, Support Team Emails & Admin Email (6:56)
Discovering Files, Links, Websites & Other Companies Related To Target (5:12)
Using The Gathered Info To Build An Attack Stratigy
Information Gathering - Gathering Info About A Person
Discovering Websites, Links & Social Networking Accounts (9:28)
Discovering Twitter Friends & Associated Accounts (4:57)
Discovering Emails Of The Target's Friends (4:39)
Analysing The Gathered Info & Building An Attack Stratigy (8:41)
Windows Evil Files
Introduction (2:14)
Windows Evil Files - Generating Undetectable Backdoors
Installing Veil Framework (7:49)
Veil Overview & Payloads Basics (7:20)
Generating An Undetectable Backdoor Using Veil 3 (9:44)
Listening For Incoming Connections (7:25)
Hacking A Windows 10 Machine Using The Generated Backdoor (7:12)
Installing The Fat Rat (6:18)
Generating An Undetectable Backdoor Using TheFatRat (11:29)
Introduction to Empire (6:21)
Creating An Empire Listener (6:50)
Crating a Windows Powershell Stager & Hacking Windows 10 (7:29)
Modifying Backdoor Source To Bypass All Anti-virus Programs (8:13)
Windows Evil Files - Spying
Introduction to Keyloggers (6:34)
Creating A Remote Keylogger (9:02)
Using a Keylogger to Capture Key Strikes Including Passwords (7:31)
Password Recovery Basics (7:31)
Recovering Saved Passwords From Local Machine (3:18)
Recovering Saved Passwords From A Remote Machine
Windows Evil Files - Enhancing Evil Files
Bypassing All Anti-Virus Programs By Modifying Hex Vales (10:35)
Creating The Perfect Spying Tool (6:49)
Windows Evil Files - Converting Evil File To A Trojan
Download & Execute Payload (6:18)
Embedding Evil Files With Any File Type Like An Image Or PDF (10:14)
Running Evil Files Silently In The Background (9:13)
Changing Trojan's Icon (8:50)
Spoofing File Extension from .exe to anything else (pdf, png ..etc) (11:33)
Download & Execute Payload (Method 2) (6:20)
Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2) (6:44)
Embedding backdoor In A Legitimate Microsoft Office Document (8:45)
Embedding Any Evil File In A Legitimate Microsoft Office Document (10:20)
Mac OS X Evil Files
Introduction (3:11)
Hacking Mac OS X Using A Meterpreter Backdoor (12:04)
Hacking Mac OS X Using An Empire Stager (6:35)
Converting Basic Backdoor To An Executable (3:33)
Embedding A Normal File With Backdoor (9:20)
Generating a Basic Trojan For Max OS X (6:49)
Changing Trojan's Icon (6:34)
Configuring The Trojan To Run Silently (6:14)
Embedding Backdoor In A Legitimate Microsoft Office Document (6:10)
Linux Evil Files
Hacking Into Linux-Like Systems Using One Command (8:56)
More Advanced Linux Backdoor (6:35)
Generating A Persistant Remote Keylogger (4:39)
Using A Remote Keylogger To Capture Key Strikes Including Passwords (9:58)
Recovering Saved Passwords From A Local Machine (7:12)
Execute & Report Payload (6:57)
Recovering Saved Passwords From A Remote Machine (6:53)
Embedding Evil Code In A Legitimate Linux Package - Part 1 (12:37)
Embedding Evil Code In A Legitimate Linux Package - Part 2 (4:59)
Backdooring a Legitimate Android App (12:14)
Delivery Methods
Introduction (1:51)
mail delivery - setting up an stmp server (7:33)
mail delivery - spoofing emails (13:45)
Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files (10:10)
Creating A Replica Of Any Website / Login Page (6:03)
Stealing Login Info Using Fake A Login Page (9:00)
BeEF Overview & Basic Hook Method (7:08)
Injecting BeEF's Hook In Any Webpage (4:57)
Luring Target Into Accessing Evil URL Without Direct Interaction (10:44)
Basic BeEF Commands (4:24)
Stealing Credentials/Passwords Using A Fake Login Prompt (2:17)
Hacking Windows 10 Using A Fake Update (4:43)
Hacking Mac OS X Using A Fake Update (4:29)
Hacking Linux Using A Fake Update (4:45)
Using The Above Attacks Outside The Local Network
Overview of the Setup (5:55)
Ex1 - Generating a Backdoor That Works Outside The Network (5:26)
Configuring The Router To Forward Connections To Kali (7:00)
Ex2 - Using BeEF Outside The Network (5:50)
Post Exploitation
Introduction (2:11)
Upgrading Basic Shell Access To A Meterpreter/Empire Access (9:07)
Automatically Execute Commands When A Reverse Shell Is Spawned (6:03)
Post Exploitation - Meterpreter
Meterpreter Basics (6:22)
File System Commands (5:10)
Maintaining Access Basic Methods (5:07)
Maintaining Access - Using a Reliable & undetectable Method (6:53)
Spying - Capturing Key Strikes & Taking Screen Shots (2:40)
Pivoting - Theory (What is Pivoting?) (7:07)
Pivoting - Exploiting Devices on The Same Network As The Target Computer (8:11)
Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More (8:43)
Post Exploitation - Empire
Basics Of Empire Agents (6:30)
File System Commands (6:43)
Upload & Execute Shell Commands (4:33)
Injecting Backdoor Process In System Processes (9:40)
Stealing root Password & Escalating Privileges On OS X (7:16)
Maintaining Access On OS X (5:36)
Security
Detecting Fake/Spoofed Emails (6:08)
How to Protect Against BeEF & Other Browser Exploits (4:17)
Detecting Trojans Manually (5:32)
Detecting Trojans Using a Sandbox (3:16)
BeEF Overview & Basic Hook Method
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock