Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Ethical Hacking Using the Cloud From Scratch
Training Overview
Description of Training
Introduction to Cloud Computing for Hackers
Teaser (6:12)
Introduction to Hacking Using the Cloud (4:09)
What is the Cloud (5:06)
Why Learn Cloud Computing as a Hacker (2:24)
Cloud Basics
Introduction to Cloud Basics (0:30)
Signing Up With AWS (3:46)
Installing Kali Linux On The Cloud (9:25)
Communicating With Cloud Computers Remotely Using SSH (6:53)
Linux Terminal Basics (9:30)
Phishing
Introduction to Phishing (2:31)
File Hosting & Firewall Settings (11:51)
Cloning Websites & Uploading Them to The Cloud (8:21)
Creating a Fake Login Page On The Cloud (5:29)
Modifying the Page to Steal Login Information (8:55)
Stealing Facebook Login Using an Identical Fake Login Page (9:43)
Domain Name & DNS Basics (8:52)
Linking Domain Names to Phishing Pages (7:20)
Introduction to HTTPS (6:03)
Enabling HTTPS on Phishing Pages (7:31)
Phishing - Bypassing 2-Multi Factor Authentication (2FA-MFA)
Introduction to Evilginx (7:00)
Installing Evilginx on the Cloud (7:48)
Bypassing 2FA MFA (8:44)
Accessing Cloud Server Desktop
Introduction and Main Setup (3:53)
Accessing The Desktop of Cloud Servers (9:46)
BitB - Browser In Browser Attack
Introduction to Browser in Browser Attack (8:08)
Polishing the Connection & Installing a Browser (4:34)
Building a Malicious Browser (7:53)
Enhancing the URL (5:10)
Hacking Gmail & Bypassing 2FA MFA (6:48)
Hacking Whatsapp (3:09)
Mobile BitB - Mobile Friendly Phishing & 2FA Bypass
Mobile Friendly Phishing Pages (8:31)
Hiding the Cursor (8:49)
Installing & Configuring a Virtual Keyboard.mp4 (6:30)
Hacking Gmail on Mobile Devices & Bypassing 2FA (6:50)
Multi-BitB Attack
Establishing Multiple Independent Connections (9:04)
Creating Independent User Sessions (6:40)
Stealing Gmail & Facebook Logins From Multiple Devices (9:21)
Hacking Web Browsers
Introduction to Browser Hacking (1:37)
Installing Needed Software (12:46)
Embedding Evil Code in Cloned Websites (9:54)
Enabling HTTPS on Malicous Pages (12:01)
Windows & Apple Mac OS Web Browser Hacking (5:23)
Programming Custom Evil Pages to Access the Target-s Location & OS (6:33)
Automatically Storing Gathered Information on the Cloud (12:48)
URL Manipulation (5:23)
Command & Control Servers (C2-C&C)
Introduction to Command & Control Servers (1:43)
What is a C2 & Which is the best (7:28)
Hacking Windows, Linux & Apple Mac OS From the Cloud
Introduction to Empire & Starkiller (10:47)
Interacting with Starkiller (5:55)
Receiving Backdoor Connections From the Cloud (9:46)
Creating a Windows Backdoor Using Starkiller (7:08)
Hacking & Controlling Windows 11 Through the Cloud (5:00)
Post Exploitation With StarKiller
File System Access & System Command Execution (8:31)
StarKiller Modules Basics (7:02)
Finding Sensitive Data on Windows & Module Filtering (6:13)
Stealing Windows Passwords (4:37)
Capturing Keystrikes & Copied Passwords (4:38)
Launching a Ransomeware Attack (7:31)
Hacking Windows Using Discord as a C2
Introduction & Setup (5:26)
Creating a Discord Server (5:35)
Weaponising Discord Servers (4:11)
Hacking Windows 11 Through Discord (8:07)
Windows Post Exploitation via Discord
Getting Computer info, Location & Stored Passwords (6:12)
Remotely Executing System Commands & Getting a Reverse Shell (7:34)
Remote File System Management With Upload & Download (6:05)
Remote Webcam & Keyboard Access (4:04)
Creating Windows Trojans
Introduction to Trojans (0:58)
Creating a Basic Trojan (9:18)
Improving Torjan-s Icon & Behaviour (3:17)
Creating Apple Mac OS & Linux Trojans
Generating a Basic Apple and Linux Backdoor (6:26)
Hacking Apple Mac OS Using a Trojan (12:02)
Hacking Linux Using a Trojan (11:11)
Advanced Malware Delivery
Introduction to self-hosting + Demo (6:19)
Introduction to Advanced Delivery Methods (0:47)
Installing a File Sharing Service on The Cloud (5:59)
Manipulating Shared Files on The Cloud (7:56)
Hiding Replacing File Type & Extension (2:50)
Manually Enabling HTTPS (6:59)
Cross-Platform Malware Delivery (9:10)
Audio
Audio Download
Generating a Basic Apple and Linux Backdoor
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock