This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Social Engineering From Scratch
SOCIAL ENGINEERING
1. What Is Social Engineering (3:14)
2. Teaser - Hacking An Android Phone & Accessing The Camera (5:34)
3. Course Overview (4:16)
Section: 1 - Preparation - Creating a Penetration Testing Lab
4. Lab Overview & Needed Software (3:27)
5. Installing Kali 2018 As a Virtual Machine Using a Ready Image (8:31)
6. Installing Windows As a Virtual Machine (3:21)
7. Installing Ubuntu As a Virtual Machine (7:05)
Section: 2 - Preparation - Linux Basics
8. Basic Overview Of Kali Linux (4:37)
9. The Linux Terminal & Basic Linux Commands (9:06)
10. Creating & Using Snapshots (6:08)
11. Updating Sources & Installing Program (4:42)
Section: 3 - Information Gathering
12. Introduction (1:52)
Section: 4 - Information Gathering - Gathering Info About A Company/Website
13. Maltego Overview (9:00)
14. Discovering Domain Info & Emails Associated With Target (7:24)
15. Discovering Information About Hosting Company, Support Team Emails & Admin Email (6:55)
16. Discovering Files, Links, Websites & Other Companies Related To Target (5:12)
17. Using The Gathered Info To Build An Attack Strategy (4:16)
Section: 5 - Information Gathering - Gathering Info About A Person
18. Discovering Websites, Links & Social Networking Accounts (9:28)
19. Discovering Twitter Friends & Associated Accounts (4:57)
20. Discovering Emails Of The Target's Friends (4:39)
21. Analysing The Gathered Info & Building An Attack Strategy (8:41)
Section: 6 - Windows Evil Files
22. Introduction (2:14)
Section: 7 - Windows Evil Files - Generating Undetectable Backdoors
23. Installing Veil 3.0 (7:49)
24. Veil Overview & Payloads Basics (7:20)
25. Generating An Undetectable Backdoor Using Veil 3 (9:44)
26. Listening For Incoming Connections (7:25)
27. Hacking A Windows 10 Machine Using The Generated Backdoor (7:12)
28. Installing The Fat Rat (6:18)
29. Generating An Undetectable Backdoor Using TheFatRat (11:29)
30. Installing Empire (4:27)
31. Creating An Empire Listener (6:50)
32. Creating a Windows Powershell Stager & Hacking Windows 10 (7:29)
33. Modifying Backdoor Source To Bypass All Anti-virus Programs (8:13)
Section: 8 - Windows Evil Files - Spying
34. What Is A Keylogger ? (6:23)
35. Creating A Remote Keylogger (4:55)
36. Using A Remote Keylogger To Capture Key Strikes Including Passwords (7:16)
37. Password Recovery Basics (7:29)
38. Recovering Saved Passwords From Local Machine (3:17)
39. Recovering Saved Passwords From A Remote Machine (11:51)
Section: 9 - Windows Evil Files - Enhancing Evil Files
40. Bypassing All Anti-Virus Programs By Modifying Hex Vales (10:35)
41. Creating The Perfect Spying Tool (6:49)
Section: 10 - Windows Evil Files - Converting Evil File To A Trojan
42. Embedding Evil Files With Any File Type Like An Image Or PDF (10:14)
43. Download & Execute Payload (6:18)
44. Running Evil Files Silently In The Background (8:46)
45. Changing Trojan's Icon (8:50)
46. Spoofing File Extension from .exe to anything else (pdf, png ..etc) (11:33)
47. Download & Execute Payload (Method 2) (6:20)
48. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2) (6:44)
49. Embedding backdoor In A Legitimate Microsoft Office Document (8:45)
50. Embedding Any Evil File In A Legitimate Microsoft Office Document (10:20)
Section: 11 - Mac OS X Evil Files
51. Introduction (3:11)
52. Hacking Mac OS X Using A Meterpreter Backdoor (12:04)
53. Hacking Mac OS X Using An Empire Stager (6:35)
54. Converting Basic Backdoor To An Executable (3:33)
55. Embedding A Normal File With Backdoor (9:20)
56. Download & Execute Payload (6:49)
57. Changing Trojan's Icon (6:34)
58. Configuring The Trojan To Run Silently (6:14)
59. Embedding Backdoor In A Legitimate Microsoft Office Document (6:10)
Section: 12 - Linux Evil Files
60. Hacking Into Linux-Like Systems Using One Command (8:54)
61. More Advanced Linux Backdoor (6:35)
62. Generating A Persistent Remote Keylogger (4:39)
63. Using A Remote Keylogger To Capture Key Strikes Including Passwords (6:43)
64. Recovering Saved Passwords From A Local Machine (7:12)
65. Execute & Report Payload (6:57)
66. Recovering Saved Passwords From A Remote Machine (6:53)
67. Embedding Evil Code In A Legitimate Linux Package - Part 1 (12:37)
68. Embedding Evil Code In A Legitimate Linux Package - Part 2 (4:59)
69. Backdooring a Legitimate Android App (9:45)
Section: 13 - Delivery Methods
70. Introduction (1:51)
71. Preparing Evil Files To Be Delivered Via A URL (6:03)
72. Email Spoofing - Send Emails As Any Email Account (7:20)
73. Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files (10:09)
74. Creating A Replica Of Any Website / Login Page (6:03)
75. Stealing Login Info Using Fake A Login Page (9:00)
76. BeEF Overview & Basic Hook Method (7:08)
77. Injecting BeEF's Hook In Any Webpage (4:57)
78. Luring Target Into Accessing Evil URL Without Direct Interaction (10:44)
79. Basic BeEF Commands (4:24)
80. Stealing Credentials/Passwords Using A Fake Login Prompt (2:17)
81. Hacking Windows 10 Using A Fake Update (4:40)
82. Hacking Mac OS X Using A Fake Update (4:29)
83. Hacking Linux Using A Fake Update (4:45)
Section: 14 - Using The Above Attacks Outside The Local Network
84. Overview of the Setup (5:55)
85. Ex1 - Generating a Backdoor That Works Outside The Network (5:24)
86. Configuring The Router To Forward Connections To Kali (6:58)
87. Ex2 - Using BeEF Outside The Network (5:49)
Section: 15 - Post Exploitation
88. Introduction (2:11)
89. Upgrading Basic Shell Access To A Meterpreter/Empire Access (9:06)
Section: 16 Post Exploitation - Meterpreter
90. Meterpreter Basics (6:22)
91. File System Commands (5:09)
92. Maintaining Access Basic Methods (5:07)
93. Maintaining Access - Using a Reliable & undetectable Method (6:53)
94. Spying - Capturing Key Strikes & Taking Screen Shots (2:39)
95. Pivoting - Theory (What is Pivoting?) (7:07)
96. Pivoting - Exploiting Devices on The Same Network As The Target Computer (8:11)
97. Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More (8:43)
98. Maintaining Access On OS X (10:28)
Section: 17 - Post Exploitation - Empire
99. Basics Of Empire Agents (6:30)
100. File System Commands (6:43)
101. Upload & Execute Shell Commands (4:33)
102. Injecting Backdoor Process In System Processes (9:38)
103. Stealing root Password & Escalating Privileges On OS X (7:16)
104. Maintaining Access On OS X (5:34)
Section: 18 - Security
105. Detecting Fake/Spoofed Emails (6:08)
106. How to Protect Against BeEF & Other Browser Exploits (4:17)
107. Detecting Trojans Manually (5:32)
108. Detecting Trojans Using a Sandbox (3:16)
86. Configuring The Router To Forward Connections To Kali
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock