Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

Learn Social Engineering From Scratch


What Is Social Engineering :
What Is Social Engineering
Teaser - Hacking An Android Phone & Accessing The Camera
Course Overview

Preparation - Creating a Penetration Testing Lab :
Lab Overview & Needed Software
Installing Kali 2017 As a Virtual Machine Using a Ready Image
Installing Windows As a Virtual Machine
Installing Ubuntu As a Virtual Machine

Preparation - Linux Basics :
Basic Overview Of Kali Linux
The Linux Terminal & Basic Linux Commands
Creating & Using Snapshots
Updating Sources & Installing Programs

Information Gathering :
Introduction

Information Gathering - Gathering Info About A Company/Website :
Maltego Overview
Discovering Domain Info & Emails Associated With Target
Discovering Information About Hosting Company, Support Team Emails & Admin Email
Discovering Files, Links, Websites & Other Companies Related To Target
Using The Gathered Info To Build An Attack Strategy

Information Gathering - Gathering Info About A Person :
Discovering Websites, Links & Social Networking Accounts
Discovering Twitter Friends & Associated Accounts
Discovering Emails Of The Target's Friends
Analysing The Gathered Info & Building An Attack Strategy

Windows Evil Files :
Introduction

Windows Evil Files - Generating Undetectable Backdoors :
Installing Veil 3.0
Veil Overview & Payloads Basics
Generating An Undetectable Backdoor Using Veil 3
Listening For Incoming Connections
Hacking A Windows 10 Machine Using The Generated Backdoor
Installing The Fat Rat
Generating An Undetectable Backdoor Using TheFatRat
Installing Empire
Creating An Empire Listener
Creating a Windows Powershell Stager & Hacking Windows 10
Modifying Backdoor Source To Bypass All Anti-virus Programs

Windows Evil Files - Spying :
What Is A Keylogger ?
Creating A Remote Keylogger
Using A Remote Keylogger To Capture Key Strikes Including Passwords
Password Recovery Basics
Recovering Saved Passwords From Local Machine
Recovering Saved Passwords From A Remote Machine

Windows Evil Files - Enhancing Evil Files :
Bypassing All Anti-Virus Programs By Modifying Hex Vales
Download & Execute Payload
Creating The Perfect Spying Tool

Windows Evil Files - Converting Evil File To A Trojan :
Embedding Evil Files With Any File Type Like An Image Or PDF
Running Evil Files Silently In The Background
Changing Trojan's Icon
Spoofing File Extension from .exe to anything else (pdf, png ..etc)
Download & Execute Payload (Method 2)
Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)
Embedding backdoor In A Legitimate Microsoft Office Document
Embedding Any Evil File In A Legitimate Microsoft Office Document

Mac OS X Evil Files :
Introduction
Hacking Mac OS X Using A Meterpreter Backdoor
Hacking Mac OS X Using An Empire Stager
Converting Basic Backdoor To An Executable
Embedding A Normal File With Backdoor
Download & Execute Payload
Changing Trojan's Icon
Configuring The Trojan To Run Silently
Embedding Backdoor In A Legitimate Microsoft Office Document

Linux Evil Files :
Hacking Into Linux-Like Systems Using One Command
More Advanced Linux Backdoor
Generating A Persistent Remote Keylogger
Using A Remote Keylogger To Capture Key Strikes Including Passwords
Recovering Saved Passwords From A Local Machine
Execute & Report Payload
Recovering Saved Passwords From A Remote Machine
Embedding Evil Code In A Legitimate Linux Package - Part 1
Embedding Evil Code In A Legitimate Linux Package - Part 2
Backdooring a Legitimate Android App

Delivery Methods :
Introduction
Preparing Evil Files To Be Delivered Via A URL
Email Spoofing - Send Emails As Any Email Account
Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files
Creating A Replica Of Any Website / Login Page
Stealing Login Info Using Fake A Login Page
BeEF Overview & Basic Hook Method
Injecting BeEF's Hook In Any Webpage
Luring Target Into Accessing Evil URL Without Direct Interaction
Basic BeEF Commands
Stealing Credentials/Passwords Using A Fake Login Prompt
Hacking Windows 10 Using A Fake Update
Hacking Mac OS X Using A Fake Update
Hacking Linux Using A Fake Update

Using The Above Attacks Outside The Local Network :
Overview of the Setup
Ex1 - Generating a Backdoor That Works Outside The Network
Configuring The Router To Forward Connections To Kali
Ex2 - Using BeEF Outside The Network

Post Exploitation :
Introduction
Upgrading Basic Shell Access To A Meterpreter/Empire Access

Post Exploitation - Meterpreter :
Meterpreter Basics
File System Commands
Maintaining Access Basic Methods
Maintaining Access - Using a Reliable & undetectable Method
Spying - Capturing Key Strikes & Taking Screen Shots
Pivoting - Theory (What is Pivoting?)
Pivoting - Exploiting Devices on The Same Network As The Target Computer
Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More
Maintaining Access On OS X

Post Exploitation - Empire :
Basics Of Empire Agents
File System Commands
Upload & Execute Shell Commands
Injecting Backdoor Process In System Processes
Stealing root Password & Escalating Privileges On OS X
Maintaining Access On OS X

Security :
Detecting Fake/Spoofed Emails
How to Protect Against BeEF & Other Browser Exploits
Detecting Trojans Manually
Detecting Trojans Using a Sandbox

Bonus Section :

You Have Got Gift 25% OFF

Use this Coupon Code “J3JKN396