Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Social Engineering From Scratch
Training Overview
Description of Training
Video Overview (3:18)
Section 0. Welcome
Teaser - Hacking An Android Phone & Accessing The Camera (5:34)
Introduction to Social Engineering (3:14)
Course Overview (4:16)
Section 1. Preparation - Creating a Penetration Testing Lab
Update Notice (2:08)
Lab Overview & Needed Software (5:54)
Initial Preparation (9:12)
Installing Kali Linux as a VM on Windows (9:16)
Installing Kali Linux as a VM on Apple Mac OS (9:24)
Installing Kali Linux as a VM on Linux (10:41)
Section 2. Preparation - Linux Basics
Basic Overview Of Kali Linux (5:22)
The Linux Terminal & Basic Linux Commands (13:06)
Section 3. Information Gathering
Introduction (1:52)
Section 4. Information Gathering - Gathering Info About A Company/Website
Maltego Overview (7:05)
Discovering Domain Info & Emails Associated With Target (7:24)
Discovering Information About Hosting Company, Support Team Emails & Admin Email (6:55)
Discovering Files, Links, Websites & Other Companies Related To Target (5:12)
Using The Gathered Info To Build An Attack Strategy (4:16)
Section 5. Information Gathering - Gathering Info About A Person
Discovering Websites, Links & Social Networking Accounts (9:28)
Discovering Twitter Friends & Associated Accounts (4:57)
Discovering Emails Of The Target's Friends (4:39)
Analysing The Gathered Info & Building An Attack Strategy (8:41)
Section 6. Windows Malware
Introduction to Windows Malware (1:16)
Installing Windows As a Virtual Machine (5:43)
Installing Windows as a Virtual Machine on Apple Silicon Computers (4:53)
Section 7. Windows Evil Files - Generating Undetectable Backdoors
Backdoors and Payloads Basics (11:52)
Creating Your Own Backdoor (8:14)
Listening for Backdoor Connections (4:15)
Hacking Windows 11 Using Your Own Backdoor (6:27)
Installing The Fat Rat (6:18)
Generating An Undetectable Backdoor For Windows - Method 2 (11:29)
Introduction to Empire (8:25)
Creating a Windows Powershell Stager & Hacking Windows 10 (8:02)
Modifying Backdoor Source To Bypass All Anti-virus Programs (8:02)
Section 8. Windows Evil Files - Spying
Introduction to Keyloggers (6:27)
Creating A Remote Keylogger (9:36)
Using A Remote Keylogger To Capture Key Strikes Including Passwords (7:31)
Password Recovery Basics (7:29)
Recovering Saved Passwords From Local Machine (3:17)
Recovering Saved Passwords From A Remote Machine (11:39)
Section 9. Windows Evil Files - Enhancing Malware
Bypassing All Anti-Virus Programs By Modifying Hex Vales (10:35)
Download & Execute Payload (6:18)
Creating The Perfect Spying Tool (6:49)
Section 10. Windows Evil Files - Creating Trojans
Embedding Evil Files With Any File Type Like an Image or PDF (10:14)
Running Evil Files Silently In The Background (7:57)
Changing Trojan's Icon (7:25)
Spoofing File Extension from .exe to anything else (pdf, png ..etc) (10:27)
Download & Execute Payload (Method 2) (6:20)
Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2) (10:20)
Embedding Backdoor In A Legitimate Microsoft Office Document (8:45)
Embedding Any Evil File In A Legitimate Microsoft Office Document (10:20)
Section 11. Mac OS X Malware
Introduction (3:11)
Hacking Mac OS X Using A Meterpreter Backdoor (12:04)
Hacking Mac OS X Using An Empire Stager (6:35)
Converting Basic Backdoor To An Executable (3:33)
Embedding A Normal File With Backdoor (9:20)
56. Generating a Basic Trojan For Max OS X (6:49)
Changing Trojan's Icon (5:51)
Configuring The Trojan To Run Silently (6:14)
Section 12. Linux Malware
Installing Ubuntu As a Virtual Machine (5:30)
Hacking Into Linux-Like Systems Using One Command (8:54)
More Advanced Linux Backdoor (6:35)
Using A Remote Keylogger To Capture Key Strikes Including Passwords (9:58)
Recovering Saved Passwords From A Local Machine (7:12)
Execute & Report Payload (6:53)
Recovering Saved Passwords From A Remote Machine (9:05)
Embedding Evil Code In A Legitimate Linux Package - Part 1 (12:37)
Embedding Evil Code In A Legitimate Linux Package - Part 2 (4:59)
Backdooring a Legitimate Android App (12:14)
Section 13. Delivery Methods
Introduction (1:51)
Mail Deliver - Setting up an SMTP Server (6:15)
Mail Delivery - Spoofing Emails (6:48)
Mail Delivery - Spoofing Email Name (6:21)
Mail Delivery - Spoofing Emails (method 2) (10:27)
Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files (10:09)
Creating A Replica Of Any Website / Login Page (6:03)
Stealing Login Info Using Fake A Login Page (10:24)
BeEF Overview & Basic Hook Method (7:08)
Injecting BeEF's Hook In Any Webpage (4:57)
URL Manipulation (9:51)
Luring Target Into Accessing Evil URL Without Direct Interaction (10:44)
Basic BeEF Commands (4:24)
Stealing Credentials/Passwords Using A Fake Login Prompt (2:17)
Hacking Windows 10 Using A Fake Update (4:40)
Hacking Mac OS X Using A Fake Update (4:29)
Hacking Linux Using A Fake Update (4:45)
Section 14. Using The Above Attacks Outside The Local Network
Overview of the Setup (6:25)
Ex1 - Generating a Backdoor That Works Outside The Network (5:24)
Configuring The Router To Forward Connections To Kali (6:58)
Ex2 - Using BeEF Outside The Network (5:49)
Section 15. Post Exploitation
Introduction (2:11)
Upgrading Basic Shell Access To A Meterpreter/Empire Access (9:06)
Section 16. Post Exploitation - Meterpreter
Meterpreter Basics (6:22)
File System Commands (5:09)
Maintaining Access (Persistence) (7:51)
Spying - Capturing Key Strikes & Taking Screen Shots (2:39)
Pivoting - Theory (What is Pivoting?) (7:07)
Pivoting - Exploiting Devices on The Same Network As The Target Computer (8:11)
Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More (8:43)
Maintaining Access On OS X (10:28)
Section 17. Post Exploitation - Empire
Basics Of Empire Agents (6:24)
File System Commands (5:58)
Upload & Execute Shell Commands (4:33)
Injecting Backdoor Process In System Processes (9:38)
Stealing root Password & Escalating Privileges On OS X (7:16)
Maintaining Access On OS X (5:34)
Section 18. Security
Detecting Fake/Spoofed Emails (6:08)
How to Protect Against BeEF & Other Browser Exploits (4:17)
Detecting Trojans Manually (5:32)
Detecting Trojans Using a Sandbox (3:16)
Audio Version of Training
Audio Download
Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock