Learn Hacking through Social Engineering From Scratch
Welcome to my course on Social Engineering! In this course, you will begin as a beginner with no past information about penetration testing or hacking, we will begin with the basics of social engineering, and by end of it you’ll be at an advanced level having the capacity to hack into all major operating systems (windows, OS X and Linux), produce types of trojans and convey them utilizing social engineering methods.
NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
- Essential IT Skills
- Understand what is hacking and social engineering and how it can be useful.
- Realize why social engineering is dangerous.
- Find out about the distinctive fields of ethical hacking
- Introduce Kali Linux – a penetration testing working framework
- Introduce windows and vulnerable operating systems as virtual machines for testing
- Understanding linux basic
- Learn linux commands and how to interact with the terminal
- Learn linux summons and how to connect with the terminal
- Assemble vital data about your objective whether it is an organization, site or an individual person.
- Find and discover websites, organizations, individuals, messages and social networking accounts related to an individual or an organization.
- On the gathered information build attack strategies
- Create imperceptible undetectable backdoors for Windows, Mac OS and Linux.
- Create Trojans that would take all passwords from a target computer and report the result by email.
- Create a remote keylogger that logs each key strike entered on a target computer and sends reports by email.
- Modify malware to influence it to bypass anti-virus programs.
- Make malicious files (backdoor, keylogger) look and capacity as a typical file (img, pdf or some other document compose).
- Implant evil records and files inside Microsoft Office documents.
- Produce Keylogger for Linux.
- Implant indirect access inside Debian package for Linux
- Produce OS X indirect accesses that look and capacity like ordinary records (images, pdf ..and so forth).
- Hack OS X and Linux PCs by sending utilizing a basic one-line command.
- Send messages from ANY email account without knowing the secret key for that record
- Make fake web sites that look precisely like some other site.
- Make a fake login page and utilize it to steal passwords.
- Utilize brilliant social engineering strategies to make the objective individual enthusiastically go and utilize our fake website.
- Learn to deliver files as fake updates and installers
- On compromised systems read-write download upload execute files
- On a compromised system capture key strokes
- To gain access to other computers on the same network learn to use a compromised computer as a pivot
- Even after the restart learn to maintain your access to the hacked systems
Curriculum
- 19 Sections
- 108 Lessons
- 52 Weeks
- Introduction2
- 1. Preparation - Creating a Penetration Testing Lab4
- 2. Preparation - Linux Basics4
- 3. Information Gathering1
- 4. Information Gathering - Gathering Info About A Company/Website5
- 5.1Maltego Overview9 Minutes
- 5.2Discovering Domain Info & Emails Associated With Target7 Minutes
- 5.3Discovering Information About Hosting Company, Support Team Emails & Admin Email4 Minutes
- 5.4Discovering Files, Links, Websites & Other Companies Related To Target5 Minutes
- 5.5Using The Gathered Info To Build An Attack Strategy6 Minutes
- 5. Information Gathering - Gathering Info About A Person4
- 6. Windows Evil Files1
- 7. Windows Evil Files - Generating Undetectable Backdoors11
- 8.1Installing Veil 3.07 Minutes
- 8.2Veil Overview & Payloads Basics7 Minutes
- 8.3Generating An Undetectable Backdoor Using Veil 39 Minutes
- 8.4Listening For Incoming Connections7 Minutes
- 8.5Hacking A Windows 10 Machine Using The Generated Backdoor8 Minutes
- 8.6Installing The Fat Rat7 Minutes
- 8.7Generating An Undetectable Backdoor Using TheFatRat4 Minutes
- 8.8Installing Empire11 Minutes
- 8.9Creating An Empire Listener6 Minutes
- 8.10Creating a Windows Powershell Stager & Hacking Windows 106 Minutes
- 8.11Modifying Backdoor Source To Bypass All Anti-virus Programs7 Minutes
- 8. Windows Evil Files - Spying6
- 9.1What Is A Keylogger ?6 Minutes
- 9.2Creating A Remote Keylogger4 Minutes
- 9.3Using A Remote Keylogger To Capture Key Strikes Including Passwords7 Minutes
- 9.4Password Recovery Basics7 Minutes
- 9.5Recovering Saved Passwords From Local Machine3 Minutes
- 9.6Recovering Saved Passwords From A Remote Machine11 Minutes
- 9. Windows Evil Files - Enhancing Evil Files2
- 10. Windows Evil Files - Converting Evil File To A Trojan9
- 11.1Embedding Evil Files With Any File Type Like An Image Or PDF10 Minutes
- 11.2Download & Execute Payload11 Minutes
- 11.3Running Evil Files Silently In The Background8 Minutes
- 11.4Changing Trojan’s Icon3 Minutes
- 11.5Spoofing File Extension from .exe to anything else (pdf, png ..etc)6 Minutes
- 11.6Download & Execute Payload (Method 2)6 Minutes
- 11.7Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)8 Minutes
- 11.8Embedding backdoor In A Legitimate Microsoft Office Document4 Minutes
- 11.9Embedding Evil Files With Any File Type Like An Image Or PDF8 Minutes
- 11. Mac OS X Evil Files9
- 12.1Introduction3 Minutes
- 12.2Hacking Mac OS X Using A Meterpreter Backdoor10 Minutes
- 12.3Hacking Mac OS X Using An Empire Stager12 Minutes
- 12.4Converting Basic Backdoor To An Executable9 Minutes
- 12.5Embedding A Normal File With Backdoor12 Minutes
- 12.6Download & Execute Payload6 Minutes
- 12.7Changing Trojan’s Icon6 Minutes
- 12.8Configuring The Trojan To Run Silently12 Minutes
- 12.9Embedding Backdoor In A Legitimate Microsoft Office Document4 Minutes
- 12. Linux Evil Files10
- 13.1Hacking Into Linux-Like Systems Using One Command8 Minutes
- 13.2More Advanced Linux Backdoor6 Minutes
- 13.3Generating A Persistent Remote Keylogger4 Minutes
- 13.4Using A Remote Keylogger To Capture Key Strikes Including Passwords6 Minutes
- 13.5Recovering Saved Passwords From A Local Machine7 Minutes
- 13.6Execute & Report Payload6 Minutes
- 13.7Recovering Saved Passwords From A Remote Machine6 Minutes
- 13.8Embedding Evil Code In A Legitimate Linux Package – Part 14 Minutes
- 13.9Embedding Evil Code In A Legitimate Linux Package – Part 2
- 13.10Backdooring a Legitimate Android App12 Minutes
- 13. Delivery Methods14
- 14.1Introduction1 Minute
- 14.2Preparing Evil Files To Be Delivered Via A URL7 Minutes
- 14.3Email Spoofing – Send Emails As Any Email Account10 Minutes
- 14.4Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files6 Minutes
- 14.5Creating A Replica Of Any Website / Login Page9 Minutes
- 14.6Stealing Login Info Using Fake A Login Page7 Minutes
- 14.7BeEF Overview & Basic Hook Method4 Minutes
- 14.8Injecting BeEF’s Hook In Any Webpage4 Minutes
- 14.9Luring Target Into Accessing Evil URL Without Direct Interaction10 Minutes
- 14.10Basic BeEF Commands4 Minutes
- 14.11Stealing Credentials/Passwords Using A Fake Login Prompt4 Minutes
- 14.12Hacking Windows 10 Using A Fake Update2 Minutes
- 14.13Hacking Mac OS X Using A Fake Update4 Minutes
- 14.14Hacking Linux Using A Fake Update4 Minutes
- 14. Using The Above Attacks Outside The Local Network4
- 15. Post Exploitation2
- 16. Post Exploitation - Meterpreter9
- 17.1Meterpreter Basics6 Minutes
- 17.2File System Commands5 Minutes
- 17.3Maintaining Access Basic Methods5 Minutes
- 17.4Maintaining Access – Using a Reliable & undetectable Method6 Minutes
- 17.5Spying – Capturing Key Strikes & Taking Screen Shots2 Minutes
- 17.6Pivoting – Theory (What is Pivoting?)2 Minutes
- 17.7Pivoting – Exploiting Devices on The Same Network As The Target Computer7 Minutes
- 17.8Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More8 Minutes
- 17.9Maintaining Access On OS X8 Minutes
- 17. Post Exploitation - Empire7
- 18.1Basics Of Empire Agents10 Minutes
- 18.2File System Commands6 Minutes
- 18.3Upload & Execute Shell Commands6 Minutes
- 18.4Injecting Backdoor Process In System Processes4 Minutes
- 18.5Stealing root Password & Escalating Privileges On OS X9 Minutes
- 18.6Maintaining Access On OS X7 Minutes
- 18.7OSX Persistence5 Minutes
- 18. Security4
Ethical Hacker, Pen-tester & Computer Scientist
I am an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. I studied PC Science in University College Dublin & graduated in 2016.
I have a superb revel in ethical hacking, I commenced making video tutorials back in 2009 in a moral hacking community (iSecuri1ty), and I additionally labored as a pen-tester for the identical enterprise. In 2013 I started out teaching my first direction on line in Arabic, this path acquired wonderful comments which prompted me to create an English version of this course.
The English course became the most famous and the top paid path, this prompted me to make more publications on moral hacking, now I have plenty of courses on ethical hacking and more than 200,000 students enrolled on exclusive teaching structures.
Courses you might be interested in
-
15 Lessons
-
10 Lessons
-
13 Lessons
-
39 Lessons