Udemy - Learning Social Engineering From Scratch
Author (Director): Udemy
Genre: Tutorial
Description:
Social engineering, sometimes referred to as the science and art of hacking the human mind, is becoming increasingly popular due to the rise of social media, email, or other forms of online communication in our lives. In the field of information security, this term is widely used to refer to a number of techniques used by cybercriminals. The latter are aimed at extorting confidential information from victims or inducing victims to commit actions aimed at penetrating the system bypassing the security system.
Duration: 11:54:17
Video quality: PCRec
Translation: One-voice voice-over (Rus)
Video: AVC/H.264, 1280x720, ~3581 Kbps
Audio: AAC, 2 ch, 192 Kbps
Description next:
Learn to hack Windows, Mac OS X, Linux & Android using social engineering.
"Welcome to the complete course on Social Engineering! In this course we will start from the very basics, you do not need to know anything about penetration testing or hacking. We will start with the basics of social engineering and by the end of the course you will be able to hack most popular operating systems systems (Windows, OS X and Linux), learn how to generate various Trojans and install them on the victim's computer using social engineering techniques.
This course focuses on the practical side of hacking, but we won't neglect the theory either. Before we move on to penetration testing, I will show you how to set up a test environment. This will help us safely practice our penetration testing skills on our own machine. The course is divided into 4 main sections:
This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:
Contents :
Contents of the first part:
Introduction
What is Social Engineering
Teaser - Hacking an Android smartphone. Gaining access to the camera
Course overview
Preparation - Preparing the working environment
Necessary software
Install Kali Linux 2017 as a virtual machine
Install Windows as a virtual machine
Install Ubuntu as virtual machine
Preparing - Linux Basics
Kali Linux Overview
Basic Linux Terminal Commands
Making Snapshots
Updating Installed Programs
Gathering Information
Introduction to Gathering Information
Gathering Information - Gathering Information about Company Website
Maltego Overview
Finding Information about Domain, Finding Email Address
Finding Information about Hosting, Support Mail, Admin Email
Contents of Part 2:
04 Gathering Information - Gathering Information about Company Website
016 - Looking for links to websites related to the victim
017 - Using the collected information to create an attack strategy
05 Gathering information - Gathering Information about the Person
018 - Looking for links to social networks
019 - Looking for linked Twitter accounts of friends
020 - Looking for E-mail friends of the victim
021 - We analyze the information received, create an attack strategy
06 Wicked Windows Files
022 - Introduction
07 Wicked Windows Files - Generating a Backdoor that Antiviruses can't see
023 - Installing Veil 3.0
024 - Veil Overview, Payload Basics
025 - Generating a Backdoor with Veil 3 that Antiviruses can't see
026 - Waiting for Incoming Connections
027 - Hacking a Windows machine using the generated Backdoor
Contents of the third part:
07 Evil Windows Files - Generating a Backdoor that Antiviruses can't see
028 - Installing The Fat Rat
029 - Generating an invisible backdoor using The Fat Rat
030 - Installing Empire
031 - Creating an Empire Foxner
032 - Create Powershell Stager, Hack Windows 10
033 - Modifying the Backdoor source, bypassing the antivirus
08 Evil Files - Surveillance
034 - What is a Keylogger
035 - Creating a remote Keylogger
036 - Capturing passwords with Keylogger
037 - Extracting passwords basics
038 - Extracting passwords from a local machine
Contents of the fourth part:
08 Evil Files - Surveillance
039 - Extract passwords from a remote machine
09 Evil Files - Improve evil files
040 - Bypass all antiviruses. Modify Hex Values
041 - Download and Execute Payload
042 - Build the Perfect Spying Tool
10 Evil Files - Convert Evil Files to Trojans
043 - We embed evil files in any files, for example, in images, PDF, MP4
044 - Invisibly launch evil files in the background
045 - Change the Trojan icon
046 - Mask the .exe file extension to any other (pdf, png, etc.)
047 - Download and Execute Payload (Payload download and run files). The second way
Contents of the fifth part:
10 Evil Files - Convert evil files to Trojans
048 - Embed evil files in any files, such as images, PDF, MP4. Method Two
049 - Embedding a Backdoor in a Real Microsoft Office Document
050 - Embedding Any Evil Files in a Real Microsoft Office Document
11 Mac OS X Evil Files
051 - Introduction
052 - Hacking Mac OS X with the Meterpreter Backdoor
053 - Hacking Mac OS X using the Empire stager
054 - Converting the backdoor to an executable file
055 - Connecting a normal file to the backdoor
056 - Download and Execute Payload (Payload of downloading and running files)
057 - Changing the icon of the trojan
058 - Hidden launch of trojans
059 - Embedding backdoor to a real Microsoft Office document
Contents of the sixth part:
12 Evil Linux files
060 - Hacking Linux with one command
061 - More advanced backdoors for Linux
062 - Installing a remote kilologger
063 - Recording everything a user types with a remote kilologger
064 - Retrieving saved passwords from local machine
065 - Payload launch and send report
066 - Retrieving saved passwords from a remote machine
067 - Embedding malicious code in a real Linux package - Part 1
068 - Embedding malicious code in a real Linux package - Part 2 069 - Embedding a backdoor
in a real Android application purpose) 070 - Introduction 071 - Preparing malicious files to be sent via URL 072 - Email spoofing - Sending messages from other addresses 073 - Hacking OS X and Linux using pure social engineering 074 - Creating a copy of the authorization page of any site 075 - Stealing credentials from using a fake login page 076 - Getting to know BeEF, the basics
077 - Embed Hook BeEF in web pages
078 - Lure the target, convince them to follow the link
079 - Basic BeEF commands
080 - Steal credentials with a fake authorization request
081 - Hack Windows 10 with a fake update
082 - Hack OS X with a fake update 083 - Hacking Linux
with a fake update outside the home network 15 After hacking 088 - Introduction
089 - Upgrading Basic Shell Access to Meterpreter/Empire
090 - Automatic Run Commands on Reverse Connection Establishment
16 After the Hack - Meterpreter
091 - Meterpreter Basics
092 - Filesystem Commands
093 - Access Support - Basic Methods
094 - Access Support - Use a Secure Stealth Method
095 - Surveillance - Capturing keystrokes - Taking screenshots
096 - Pivoting - Theory. What is Pivoting
097 - Pivoting - We hack devices that are on the same network with us
Contents 9 parts:
16 After hacking - Meterpreter
098 - Manage an Android smartphone - Get access to the microphone, camera, file system, etc.
099 - Access support on Mac OS X
17 After the Hack - Empire
100 - Agent Basics
101 - File System Commands
102 - Shell Commands for Uploading Files to the Victim's Machine
103 - Injecting a Backdoor Process into the System Process
104 - Stealing the Root User's Password. Elevating Permissions in OS X
105 - Maintaining Access on OS X
18 Security
106 - Exposing Fake Emails
107 - How to Protect Against BeEF and Other Browser Exploits
108 - Manually Detect Trojans
109 - Detect Trojans with Sandbox
Author (Director): Udemy
Genre: Tutorial
Description:
Social engineering, sometimes referred to as the science and art of hacking the human mind, is becoming increasingly popular due to the rise of social media, email, or other forms of online communication in our lives. In the field of information security, this term is widely used to refer to a number of techniques used by cybercriminals. The latter are aimed at extorting confidential information from victims or inducing victims to commit actions aimed at penetrating the system bypassing the security system.
Duration: 11:54:17
Video quality: PCRec
Translation: One-voice voice-over (Rus)
Video: AVC/H.264, 1280x720, ~3581 Kbps
Audio: AAC, 2 ch, 192 Kbps
Description next:
Learn to hack Windows, Mac OS X, Linux & Android using social engineering.
"Welcome to the complete course on Social Engineering! In this course we will start from the very basics, you do not need to know anything about penetration testing or hacking. We will start with the basics of social engineering and by the end of the course you will be able to hack most popular operating systems systems (Windows, OS X and Linux), learn how to generate various Trojans and install them on the victim's computer using social engineering techniques.
This course focuses on the practical side of hacking, but we won't neglect the theory either. Before we move on to penetration testing, I will show you how to set up a test environment. This will help us safely practice our penetration testing skills on our own machine. The course is divided into 4 main sections:
- Collecting Information - In this section, I will teach you how to collect information about the victim. It can be either a company or a website or a person. I will teach you how to collect information that is related to your goal, such as websites, links, companies, list of people, email addresses, phone numbers, friends list, social media accounts, etc. I will also teach you how to use this information to create an attack strategy.
- Generating Evil Files - In this section, I will teach you how to generate evil files (files that will do what you want on the victim's computer). We will talk about backdoors, keyloggers, etc. You will learn how to generate these files for Windows, OS X and Linux operating systems. And that is not all. You will also learn how to make these files bypass antivirus checks, we will make them behave like a normal image or PDF, you will also learn how to embed these files in Microsoft Office documents.
- Delivery Methods - In this section, you will learn social engineering methods that will allow you to deliver Trojans to the victim's computer. You will learn how to create fake websites that look like the real thing, how to send email like it was sent by people you can trust. You will also learn how to use fake login pages and fake updates. With the help of them, you can hack into the victim's system. But that's not all, you'll also learn advanced social engineering techniques that will entice the target to visit a malicious URL, and by clicking on it, the target will be hacked.
- After hacking - In this section, you will learn how to interact with the system. You will learn how to access the file system, maintain access, change permissions, monitor the target, use the victim's computer as a starting point for hacking the rest of the computers in the system.
This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:
Contents :
Contents of the first part:
Introduction
What is Social Engineering
Teaser - Hacking an Android smartphone. Gaining access to the camera
Course overview
Preparation - Preparing the working environment
Necessary software
Install Kali Linux 2017 as a virtual machine
Install Windows as a virtual machine
Install Ubuntu as virtual machine
Preparing - Linux Basics
Kali Linux Overview
Basic Linux Terminal Commands
Making Snapshots
Updating Installed Programs
Gathering Information
Introduction to Gathering Information
Gathering Information - Gathering Information about Company Website
Maltego Overview
Finding Information about Domain, Finding Email Address
Finding Information about Hosting, Support Mail, Admin Email
Contents of Part 2:
04 Gathering Information - Gathering Information about Company Website
016 - Looking for links to websites related to the victim
017 - Using the collected information to create an attack strategy
05 Gathering information - Gathering Information about the Person
018 - Looking for links to social networks
019 - Looking for linked Twitter accounts of friends
020 - Looking for E-mail friends of the victim
021 - We analyze the information received, create an attack strategy
06 Wicked Windows Files
022 - Introduction
07 Wicked Windows Files - Generating a Backdoor that Antiviruses can't see
023 - Installing Veil 3.0
024 - Veil Overview, Payload Basics
025 - Generating a Backdoor with Veil 3 that Antiviruses can't see
026 - Waiting for Incoming Connections
027 - Hacking a Windows machine using the generated Backdoor
Contents of the third part:
07 Evil Windows Files - Generating a Backdoor that Antiviruses can't see
028 - Installing The Fat Rat
029 - Generating an invisible backdoor using The Fat Rat
030 - Installing Empire
031 - Creating an Empire Foxner
032 - Create Powershell Stager, Hack Windows 10
033 - Modifying the Backdoor source, bypassing the antivirus
08 Evil Files - Surveillance
034 - What is a Keylogger
035 - Creating a remote Keylogger
036 - Capturing passwords with Keylogger
037 - Extracting passwords basics
038 - Extracting passwords from a local machine
Contents of the fourth part:
08 Evil Files - Surveillance
039 - Extract passwords from a remote machine
09 Evil Files - Improve evil files
040 - Bypass all antiviruses. Modify Hex Values
041 - Download and Execute Payload
042 - Build the Perfect Spying Tool
10 Evil Files - Convert Evil Files to Trojans
043 - We embed evil files in any files, for example, in images, PDF, MP4
044 - Invisibly launch evil files in the background
045 - Change the Trojan icon
046 - Mask the .exe file extension to any other (pdf, png, etc.)
047 - Download and Execute Payload (Payload download and run files). The second way
Contents of the fifth part:
10 Evil Files - Convert evil files to Trojans
048 - Embed evil files in any files, such as images, PDF, MP4. Method Two
049 - Embedding a Backdoor in a Real Microsoft Office Document
050 - Embedding Any Evil Files in a Real Microsoft Office Document
11 Mac OS X Evil Files
051 - Introduction
052 - Hacking Mac OS X with the Meterpreter Backdoor
053 - Hacking Mac OS X using the Empire stager
054 - Converting the backdoor to an executable file
055 - Connecting a normal file to the backdoor
056 - Download and Execute Payload (Payload of downloading and running files)
057 - Changing the icon of the trojan
058 - Hidden launch of trojans
059 - Embedding backdoor to a real Microsoft Office document
Contents of the sixth part:
12 Evil Linux files
060 - Hacking Linux with one command
061 - More advanced backdoors for Linux
062 - Installing a remote kilologger
063 - Recording everything a user types with a remote kilologger
064 - Retrieving saved passwords from local machine
065 - Payload launch and send report
066 - Retrieving saved passwords from a remote machine
067 - Embedding malicious code in a real Linux package - Part 1
068 - Embedding malicious code in a real Linux package - Part 2 069 - Embedding a backdoor
in a real Android application purpose) 070 - Introduction 071 - Preparing malicious files to be sent via URL 072 - Email spoofing - Sending messages from other addresses 073 - Hacking OS X and Linux using pure social engineering 074 - Creating a copy of the authorization page of any site 075 - Stealing credentials from using a fake login page 076 - Getting to know BeEF, the basics
077 - Embed Hook BeEF in web pages
078 - Lure the target, convince them to follow the link
079 - Basic BeEF commands
080 - Steal credentials with a fake authorization request
081 - Hack Windows 10 with a fake update
082 - Hack OS X with a fake update 083 - Hacking Linux
with a fake update outside the home network 15 After hacking 088 - Introduction
089 - Upgrading Basic Shell Access to Meterpreter/Empire
090 - Automatic Run Commands on Reverse Connection Establishment
16 After the Hack - Meterpreter
091 - Meterpreter Basics
092 - Filesystem Commands
093 - Access Support - Basic Methods
094 - Access Support - Use a Secure Stealth Method
095 - Surveillance - Capturing keystrokes - Taking screenshots
096 - Pivoting - Theory. What is Pivoting
097 - Pivoting - We hack devices that are on the same network with us
Contents 9 parts:
16 After hacking - Meterpreter
098 - Manage an Android smartphone - Get access to the microphone, camera, file system, etc.
099 - Access support on Mac OS X
17 After the Hack - Empire
100 - Agent Basics
101 - File System Commands
102 - Shell Commands for Uploading Files to the Victim's Machine
103 - Injecting a Backdoor Process into the System Process
104 - Stealing the Root User's Password. Elevating Permissions in OS X
105 - Maintaining Access on OS X
18 Security
106 - Exposing Fake Emails
107 - How to Protect Against BeEF and Other Browser Exploits
108 - Manually Detect Trojans
109 - Detect Trojans with Sandbox
You must reply before you can see the hidden data contained here.