Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Social Engineering From Scratch
Training Overview
Description of Training
Video Overview (3:18)
Section 0. Welcome
Teaser - Hacking An Android Phone & Accessing The Camera (5:34)
Introduction to Social Engineering (3:14)
Course Overview (4:16)
Section 1. Preparation - Creating a Penetration Testing Lab
Update Notice (2:08)
Lab Overview & Needed Software (5:54)
Initial Preparation (9:12)
Installing Kali Linux as a VM on Windows (9:16)
Installing Kali Linux as a VM on Apple Mac OS (9:24)
Installing Kali Linux as a VM on Linux (10:41)
Section 2. Preparation - Linux Basics
Basic Overview Of Kali Linux (5:22)
The Linux Terminal & Basic Linux Commands (13:06)
Section 3. Information Gathering
Introduction (1:52)
Section 4. Information Gathering - Gathering Info About A Company/Website
Maltego Overview (7:05)
Discovering Domain Info & Emails Associated With Target (7:24)
Discovering Information About Hosting Company, Support Team Emails & Admin Email (6:55)
Discovering Files, Links, Websites & Other Companies Related To Target (5:12)
Using The Gathered Info To Build An Attack Strategy (4:16)
Section 5. Information Gathering - Gathering Info About A Person
Discovering Websites, Links & Social Networking Accounts (9:28)
Discovering Twitter Friends & Associated Accounts (4:57)
Discovering Emails Of The Target's Friends (4:39)
Analysing The Gathered Info & Building An Attack Strategy (8:41)
Section 6. Windows Malware
Introduction to Windows Malware (1:16)
Installing Windows As a Virtual Machine (5:43)
Installing Windows as a Virtual Machine on Apple Silicon Computers (4:53)
Section 7. Windows Evil Files - Generating Undetectable Backdoors
Backdoors and Payloads Basics (11:52)
Creating Your Own Backdoor (8:14)
Listening for Backdoor Connections (4:15)
Hacking Windows 11 Using Your Own Backdoor (6:27)
Installing The Fat Rat (6:18)
Generating An Undetectable Backdoor For Windows - Method 2 (11:29)
Introduction to Empire (8:25)
Creating a Windows Powershell Stager & Hacking Windows 10 (8:02)
Modifying Backdoor Source To Bypass All Anti-virus Programs (8:02)
Section 8. Windows Evil Files - Spying
Introduction to Keyloggers (6:27)
Creating A Remote Keylogger (9:36)
Using A Remote Keylogger To Capture Key Strikes Including Passwords (7:31)
Password Recovery Basics (7:29)
Recovering Saved Passwords From Local Machine (3:17)
Recovering Saved Passwords From A Remote Machine (11:39)
Section 9. Windows Evil Files - Enhancing Malware
Bypassing All Anti-Virus Programs By Modifying Hex Vales (10:35)
Download & Execute Payload (6:18)
Creating The Perfect Spying Tool (6:49)
Section 10. Windows Evil Files - Creating Trojans
Embedding Evil Files With Any File Type Like an Image or PDF (10:14)
Running Evil Files Silently In The Background (7:57)
Changing Trojan's Icon (7:25)
Spoofing File Extension from .exe to anything else (pdf, png ..etc) (10:27)
Download & Execute Payload (Method 2) (6:20)
Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2) (10:20)
Embedding Backdoor In A Legitimate Microsoft Office Document (8:45)
Embedding Any Evil File In A Legitimate Microsoft Office Document (10:20)
Section 11. Mac OS X Malware
Introduction (3:11)
Hacking Mac OS X Using A Meterpreter Backdoor (12:04)
Hacking Mac OS X Using An Empire Stager (6:35)
Converting Basic Backdoor To An Executable (3:33)
Embedding A Normal File With Backdoor (9:20)
56. Generating a Basic Trojan For Max OS X (6:49)
Changing Trojan's Icon (5:51)
Configuring The Trojan To Run Silently (6:14)
Section 12. Linux Malware
Installing Ubuntu As a Virtual Machine (5:30)
Hacking Into Linux-Like Systems Using One Command (8:54)
More Advanced Linux Backdoor (6:35)
Using A Remote Keylogger To Capture Key Strikes Including Passwords (9:58)
Recovering Saved Passwords From A Local Machine (7:12)
Execute & Report Payload (6:53)
Recovering Saved Passwords From A Remote Machine (9:05)
Embedding Evil Code In A Legitimate Linux Package - Part 1 (12:37)
Embedding Evil Code In A Legitimate Linux Package - Part 2 (4:59)
Backdooring a Legitimate Android App (12:14)
Section 13. Delivery Methods
Introduction (1:51)
Mail Deliver - Setting up an SMTP Server (6:15)
Mail Delivery - Spoofing Emails (6:48)
Mail Delivery - Spoofing Email Name (6:21)
Mail Delivery - Spoofing Emails (method 2) (10:27)
Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files (10:09)
Creating A Replica Of Any Website / Login Page (6:03)
Stealing Login Info Using Fake A Login Page (10:24)
BeEF Overview & Basic Hook Method (7:08)
Injecting BeEF's Hook In Any Webpage (4:57)
URL Manipulation (9:51)
Luring Target Into Accessing Evil URL Without Direct Interaction (10:44)
Basic BeEF Commands (4:24)
Stealing Credentials/Passwords Using A Fake Login Prompt (2:17)
Hacking Windows 10 Using A Fake Update (4:40)
Hacking Mac OS X Using A Fake Update (4:29)
Hacking Linux Using A Fake Update (4:45)
Section 14. Using The Above Attacks Outside The Local Network
Overview of the Setup (6:25)
Ex1 - Generating a Backdoor That Works Outside The Network (5:24)
Configuring The Router To Forward Connections To Kali (6:58)
Ex2 - Using BeEF Outside The Network (5:49)
Section 15. Post Exploitation
Introduction (2:11)
Upgrading Basic Shell Access To A Meterpreter/Empire Access (9:06)
Section 16. Post Exploitation - Meterpreter
Meterpreter Basics (6:22)
File System Commands (5:09)
Maintaining Access (Persistence) (7:51)
Spying - Capturing Key Strikes & Taking Screen Shots (2:39)
Pivoting - Theory (What is Pivoting?) (7:07)
Pivoting - Exploiting Devices on The Same Network As The Target Computer (8:11)
Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More (8:43)
Maintaining Access On OS X (10:28)
Section 17. Post Exploitation - Empire
Basics Of Empire Agents (6:24)
File System Commands (5:58)
Upload & Execute Shell Commands (4:33)
Injecting Backdoor Process In System Processes (9:38)
Stealing root Password & Escalating Privileges On OS X (7:16)
Maintaining Access On OS X (5:34)
Section 18. Security
Detecting Fake/Spoofed Emails (6:08)
How to Protect Against BeEF & Other Browser Exploits (4:17)
Detecting Trojans Manually (5:32)
Detecting Trojans Using a Sandbox (3:16)
Audio Version of Training
Audio Download
Maintaining Access (Persistence)
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock