Curriculum
19 Sections
108 Lessons
52 Weeks
Expand all sections
Collapse all sections
Introduction
2
1.1
Teaser – Hacking An Android Phone & Accessing The Camera
3 Minutes
1.2
Course Overview
4 Minutes
1. Preparation - Creating a Penetration Testing Lab
4
2.1
Lab Overview & Needed Software
3 Minutes
2.2
Installing Kali 2018 As a Virtual Machine Using a Ready Image
3 Minutes
2.3
Installing Windows As a Virtual Machine
8 Minutes
2.4
Installing Ubuntu As a Virtual Machine
7 Minutes
2. Preparation - Linux Basics
4
3.1
Basic Overview Of Kali Linux
4 Minutes
3.2
The Linux Terminal & Basic Linux Commands
9 Minutes
3.3
Creating & Using Snapshots
6 Minutes
3.4
Updating Sources & Installing Programs Section 2, Lecture 11
1 Minute
3. Information Gathering
1
4.1
Introduction
4 Minutes
4. Information Gathering - Gathering Info About A Company/Website
5
5.1
Maltego Overview
9 Minutes
5.2
Discovering Domain Info & Emails Associated With Target
7 Minutes
5.3
Discovering Information About Hosting Company, Support Team Emails & Admin Email
4 Minutes
5.4
Discovering Files, Links, Websites & Other Companies Related To Target
5 Minutes
5.5
Using The Gathered Info To Build An Attack Strategy
6 Minutes
5. Information Gathering - Gathering Info About A Person
4
6.1
Discovering Websites, Links & Social Networking Accounts
9 Minutes
6.2
Discovering Twitter Friends & Associated Accountss
4 Minutes
6.3
Discovering Emails Of The Target’s Friends
4 Minutes
6.4
Analysing The Gathered Info & Building An Attack Strategy
6. Windows Evil Files
1
7.1
Introduction
8 Minutes
7. Windows Evil Files - Generating Undetectable Backdoors
11
8.1
Installing Veil 3.0
7 Minutes
8.2
Veil Overview & Payloads Basics
7 Minutes
8.3
Generating An Undetectable Backdoor Using Veil 3
9 Minutes
8.4
Listening For Incoming Connections
7 Minutes
8.5
Hacking A Windows 10 Machine Using The Generated Backdoor
8 Minutes
8.6
Installing The Fat Rat
7 Minutes
8.7
Generating An Undetectable Backdoor Using TheFatRat
4 Minutes
8.8
Installing Empire
11 Minutes
8.9
Creating An Empire Listener
6 Minutes
8.10
Creating a Windows Powershell Stager & Hacking Windows 10
6 Minutes
8.11
Modifying Backdoor Source To Bypass All Anti-virus Programs
7 Minutes
8. Windows Evil Files - Spying
6
9.1
What Is A Keylogger ?
6 Minutes
9.2
Creating A Remote Keylogger
4 Minutes
9.3
Using A Remote Keylogger To Capture Key Strikes Including Passwords
7 Minutes
9.4
Password Recovery Basics
7 Minutes
9.5
Recovering Saved Passwords From Local Machine
3 Minutes
9.6
Recovering Saved Passwords From A Remote Machine
11 Minutes
9. Windows Evil Files - Enhancing Evil Files
2
10.1
Bypassing All Anti-Virus Programs By Modifying Hex Vales
7 Minutes
10.2
Creating The Perfect Spying Tool
3 Minutes
10. Windows Evil Files - Converting Evil File To A Trojan
9
11.1
Embedding Evil Files With Any File Type Like An Image Or PDF
10 Minutes
11.2
Download & Execute Payload
11 Minutes
11.3
Running Evil Files Silently In The Background
8 Minutes
11.4
Changing Trojan’s Icon
3 Minutes
11.5
Spoofing File Extension from .exe to anything else (pdf, png ..etc)
6 Minutes
11.6
Download & Execute Payload (Method 2)
6 Minutes
11.7
Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)
8 Minutes
11.8
Embedding backdoor In A Legitimate Microsoft Office Document
4 Minutes
11.9
Embedding Evil Files With Any File Type Like An Image Or PDF
8 Minutes
11. Mac OS X Evil Files
9
12.1
Introduction
3 Minutes
12.2
Hacking Mac OS X Using A Meterpreter Backdoor
10 Minutes
12.3
Hacking Mac OS X Using An Empire Stager
12 Minutes
12.4
Converting Basic Backdoor To An Executable
9 Minutes
12.5
Embedding A Normal File With Backdoor
12 Minutes
12.6
Download & Execute Payload
6 Minutes
12.7
Changing Trojan’s Icon
6 Minutes
12.8
Configuring The Trojan To Run Silently
12 Minutes
12.9
Embedding Backdoor In A Legitimate Microsoft Office Document
4 Minutes
12. Linux Evil Files
10
13.1
Hacking Into Linux-Like Systems Using One Command
8 Minutes
13.2
More Advanced Linux Backdoor
6 Minutes
13.3
Generating A Persistent Remote Keylogger
4 Minutes
13.4
Using A Remote Keylogger To Capture Key Strikes Including Passwords
6 Minutes
13.5
Recovering Saved Passwords From A Local Machine
7 Minutes
13.6
Execute & Report Payload
6 Minutes
13.7
Recovering Saved Passwords From A Remote Machine
6 Minutes
13.8
Embedding Evil Code In A Legitimate Linux Package – Part 1
4 Minutes
13.9
Embedding Evil Code In A Legitimate Linux Package – Part 2
13.10
Backdooring a Legitimate Android App
12 Minutes
13. Delivery Methods
14
14.1
Introduction
1 Minute
14.2
Preparing Evil Files To Be Delivered Via A URL
7 Minutes
14.3
Email Spoofing – Send Emails As Any Email Account
10 Minutes
14.4
Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files
6 Minutes
14.5
Creating A Replica Of Any Website / Login Page
9 Minutes
14.6
Stealing Login Info Using Fake A Login Page
7 Minutes
14.7
BeEF Overview & Basic Hook Method
4 Minutes
14.8
Injecting BeEF’s Hook In Any Webpage
4 Minutes
14.9
Luring Target Into Accessing Evil URL Without Direct Interaction
10 Minutes
14.10
Basic BeEF Commands
4 Minutes
14.11
Stealing Credentials/Passwords Using A Fake Login Prompt
4 Minutes
14.12
Hacking Windows 10 Using A Fake Update
2 Minutes
14.13
Hacking Mac OS X Using A Fake Update
4 Minutes
14.14
Hacking Linux Using A Fake Update
4 Minutes
14. Using The Above Attacks Outside The Local Network
4
15.1
Overview of the Setup
5 Minutes
15.2
Ex1 – Generating a Backdoor That Works Outside The Network
5 Minutes
15.3
Configuring The Router To Forward Connections To Kali
6 Minutes
15.4
Ex2 – Using BeEF Outside The Network
5 Minutes
15. Post Exploitation
2
16.1
Introduction
2 Minutes
16.2
Upgrading Basic Shell Access To A Meterpreter/Empire Access
9 Minutes
16. Post Exploitation - Meterpreter
9
17.1
Meterpreter Basics
6 Minutes
17.2
File System Commands
5 Minutes
17.3
Maintaining Access Basic Methods
5 Minutes
17.4
Maintaining Access – Using a Reliable & undetectable Method
6 Minutes
17.5
Spying – Capturing Key Strikes & Taking Screen Shots
2 Minutes
17.6
Pivoting – Theory (What is Pivoting?)
2 Minutes
17.7
Pivoting – Exploiting Devices on The Same Network As The Target Computer
7 Minutes
17.8
Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More
8 Minutes
17.9
Maintaining Access On OS X
8 Minutes
17. Post Exploitation - Empire
7
18.1
Basics Of Empire Agents
10 Minutes
18.2
File System Commands
6 Minutes
18.3
Upload & Execute Shell Commands
6 Minutes
18.4
Injecting Backdoor Process In System Processes
4 Minutes
18.5
Stealing root Password & Escalating Privileges On OS X
9 Minutes
18.6
Maintaining Access On OS X
7 Minutes
18.7
OSX Persistence
5 Minutes
18. Security
4
19.1
105. Detecting Fake/Spoofed Emails
6 Minutes
19.2
How to Protect Against BeEF & Other Browser Exploits
4 Minutes
19.3
Detecting Trojans Manually
5 Minutes
19.4
Detecting Trojans Using a Sandbox
3 Minutes
Learn Hacking through Social Engineering From Scratch
Search
Teaser – Hacking An Android Phone & Accessing The Camera
https://dwnk32xmy75f1.cloudfront.net/wp-content/uploads/20180925093040/ezgif.com-crop-34.mp4
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content