0xploit.com

Social Engineering Full Course (110 Lectures)

MachineGun

New member
Devil
Joined
May 20, 2023
Messages
4
Hellcoins
♆9
Udemy - Learning Social Engineering From Scratch
Author (Director): Udemy

Genre: Tutorial

Description:

Social engineering, sometimes referred to as the science and art of hacking the human mind, is becoming increasingly popular due to the rise of social media, email, or other forms of online communication in our lives. In the field of information security, this term is widely used to refer to a number of techniques used by cybercriminals. The latter are aimed at extorting confidential information from victims or inducing victims to commit actions aimed at penetrating the system bypassing the security system.

Duration: 11:54:17

Video quality: PCRec

Translation: One-voice voice-over (Rus)

Video: AVC/H.264, 1280x720, ~3581 Kbps

Audio: AAC, 2 ch, 192 Kbps

Description next:

Learn to hack Windows, Mac OS X, Linux & Android using social engineering.

"Welcome to the complete course on Social Engineering! In this course we will start from the very basics, you do not need to know anything about penetration testing or hacking. We will start with the basics of social engineering and by the end of the course you will be able to hack most popular operating systems systems (Windows, OS X and Linux), learn how to generate various Trojans and install them on the victim's computer using social engineering techniques.

This course focuses on the practical side of hacking, but we won't neglect the theory either. Before we move on to penetration testing, I will show you how to set up a test environment. This will help us safely practice our penetration testing skills on our own machine. The course is divided into 4 main sections:

  1. Collecting Information - In this section, I will teach you how to collect information about the victim. It can be either a company or a website or a person. I will teach you how to collect information that is related to your goal, such as websites, links, companies, list of people, email addresses, phone numbers, friends list, social media accounts, etc. I will also teach you how to use this information to create an attack strategy.

  2. Generating Evil Files - In this section, I will teach you how to generate evil files (files that will do what you want on the victim's computer). We will talk about backdoors, keyloggers, etc. You will learn how to generate these files for Windows, OS X and Linux operating systems. And that is not all. You will also learn how to make these files bypass antivirus checks, we will make them behave like a normal image or PDF, you will also learn how to embed these files in Microsoft Office documents.

  3. Delivery Methods - In this section, you will learn social engineering methods that will allow you to deliver Trojans to the victim's computer. You will learn how to create fake websites that look like the real thing, how to send email like it was sent by people you can trust. You will also learn how to use fake login pages and fake updates. With the help of them, you can hack into the victim's system. But that's not all, you'll also learn advanced social engineering techniques that will entice the target to visit a malicious URL, and by clicking on it, the target will be hacked.

  4. After hacking - In this section, you will learn how to interact with the system. You will learn how to access the file system, maintain access, change permissions, monitor the target, use the victim's computer as a starting point for hacking the rest of the computers in the system.

This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:

Contents :

Contents of the first part:

Introduction

What is Social Engineering

Teaser - Hacking an Android smartphone. Gaining access to the camera

Course overview

Preparation - Preparing the working environment

Necessary software

Install Kali Linux 2017 as a virtual machine

Install Windows as a virtual machine

Install Ubuntu as virtual machine

Preparing - Linux Basics

Kali Linux Overview

Basic Linux Terminal Commands

Making Snapshots

Updating Installed Programs

Gathering Information

Introduction to Gathering Information

Gathering Information - Gathering Information about Company Website

Maltego Overview

Finding Information about Domain, Finding Email Address

Finding Information about Hosting, Support Mail, Admin Email


Contents of Part 2:

04 Gathering Information - Gathering Information about Company Website

016 - Looking for links to websites related to the victim

017 - Using the collected information to create an attack strategy

05 Gathering information - Gathering Information about the Person

018 - Looking for links to social networks

019 - Looking for linked Twitter accounts of friends

020 - Looking for E-mail friends of the victim

021 - We analyze the information received, create an attack strategy

06 Wicked Windows Files

022 - Introduction

07 Wicked Windows Files - Generating a Backdoor that Antiviruses can't see

023 - Installing Veil 3.0

024 - Veil Overview, Payload Basics

025 - Generating a Backdoor with Veil 3 that Antiviruses can't see

026 - Waiting for Incoming Connections

027 - Hacking a Windows machine using the generated Backdoor


Contents of the third part:

07 Evil Windows Files - Generating a Backdoor that Antiviruses can't see

028 - Installing The Fat Rat

029 - Generating an invisible backdoor using The Fat Rat

030 - Installing Empire

031 - Creating an Empire Foxner

032 - Create Powershell Stager, Hack Windows 10

033 - Modifying the Backdoor source, bypassing the antivirus

08 Evil Files - Surveillance

034 - What is a Keylogger

035 - Creating a remote Keylogger

036 - Capturing passwords with Keylogger

037 - Extracting passwords basics

038 - Extracting passwords from a local machine


Contents of the fourth part:

08 Evil Files - Surveillance

039 - Extract passwords from a remote machine

09 Evil Files - Improve evil files

040 - Bypass all antiviruses. Modify Hex Values

041 - Download and Execute Payload

042 - Build the Perfect Spying Tool

10 Evil Files - Convert Evil Files to Trojans

043 - We embed evil files in any files, for example, in images, PDF, MP4

044 - Invisibly launch evil files in the background

045 - Change the Trojan icon

046 - Mask the .exe file extension to any other (pdf, png, etc.)

047 - Download and Execute Payload (Payload download and run files). The second way


Contents of the fifth part:

10 Evil Files - Convert evil files to Trojans

048 - Embed evil files in any files, such as images, PDF, MP4. Method Two

049 - Embedding a Backdoor in a Real Microsoft Office Document

050 - Embedding Any Evil Files in a Real Microsoft Office Document

11 Mac OS X Evil Files

051 - Introduction

052 - Hacking Mac OS X with the Meterpreter Backdoor

053 - Hacking Mac OS X using the Empire stager

054 - Converting the backdoor to an executable file

055 - Connecting a normal file to the backdoor

056 - Download and Execute Payload (Payload of downloading and running files)

057 - Changing the icon of the trojan

058 - Hidden launch of trojans

059 - Embedding backdoor to a real Microsoft Office document
Contents of the sixth part:

12 Evil Linux files

060 - Hacking Linux with one command

061 - More advanced backdoors for Linux

062 - Installing a remote kilologger

063 - Recording everything a user types with a remote kilologger

064 - Retrieving saved passwords from local machine

065 - Payload launch and send report

066 - Retrieving saved passwords from a remote machine

067 - Embedding malicious code in a real Linux package - Part 1

068 - Embedding malicious code in a real Linux package - Part 2 069 - Embedding a backdoor

in a real Android application purpose) 070 - Introduction 071 - Preparing malicious files to be sent via URL 072 - Email spoofing - Sending messages from other addresses 073 - Hacking OS X and Linux using pure social engineering 074 - Creating a copy of the authorization page of any site 075 - Stealing credentials from using a fake login page 076 - Getting to know BeEF, the basics

077 - Embed Hook BeEF in web pages

078 - Lure the target, convince them to follow the link

079 - Basic BeEF commands

080 - Steal credentials with a fake authorization request

081 - Hack Windows 10 with a fake update

082 - Hack OS X with a fake update 083 - Hacking Linux

with a fake update outside the home network 15 After hacking 088 - Introduction



089 - Upgrading Basic Shell Access to Meterpreter/Empire

090 - Automatic Run Commands on Reverse Connection Establishment

16 After the Hack - Meterpreter

091 - Meterpreter Basics

092 - Filesystem Commands

093 - Access Support - Basic Methods

094 - Access Support - Use a Secure Stealth Method

095 - Surveillance - Capturing keystrokes - Taking screenshots

096 - Pivoting - Theory. What is Pivoting

097 - Pivoting - We hack devices that are on the same network with us


Contents 9 parts:

16 After hacking - Meterpreter

098 - Manage an Android smartphone - Get access to the microphone, camera, file system, etc.

099 - Access support on Mac OS X

17 After the Hack - Empire

100 - Agent Basics

101 - File System Commands

102 - Shell Commands for Uploading Files to the Victim's Machine

103 - Injecting a Backdoor Process into the System Process

104 - Stealing the Root User's Password. Elevating Permissions in OS X

105 - Maintaining Access on OS X

18 Security

106 - Exposing Fake Emails

107 - How to Protect Against BeEF and Other Browser Exploits

108 - Manually Detect Trojans

109 - Detect Trojans with Sandbox
You must reply before you can see the hidden data contained here.
 
Joined
May 25, 2023
Messages
20
Hellcoins
♆30
Udemy - Learning Social Engineering From Scratch
Author (Director): Udemy

Genre: Tutorial

Description:

Social engineering, sometimes referred to as the science and art of hacking the human mind, is becoming increasingly popular due to the rise of social media, email, or other forms of online communication in our lives. In the field of information security, this term is widely used to refer to a number of techniques used by cybercriminals. The latter are aimed at extorting confidential information from victims or inducing victims to commit actions aimed at penetrating the system bypassing the security system.

Duration: 11:54:17

Video quality: PCRec

Translation: One-voice voice-over (Rus)

Video: AVC/H.264, 1280x720, ~3581 Kbps

Audio: AAC, 2 ch, 192 Kbps

Description next:

Learn to hack Windows, Mac OS X, Linux & Android using social engineering.

"Welcome to the complete course on Social Engineering! In this course we will start from the very basics, you do not need to know anything about penetration testing or hacking. We will start with the basics of social engineering and by the end of the course you will be able to hack most popular operating systems systems (Windows, OS X and Linux), learn how to generate various Trojans and install them on the victim's computer using social engineering techniques.

This course focuses on the practical side of hacking, but we won't neglect the theory either. Before we move on to penetration testing, I will show you how to set up a test environment. This will help us safely practice our penetration testing skills on our own machine. The course is divided into 4 main sections:

  1. Collecting Information - In this section, I will teach you how to collect information about the victim. It can be either a company or a website or a person. I will teach you how to collect information that is related to your goal, such as websites, links, companies, list of people, email addresses, phone numbers, friends list, social media accounts, etc. I will also teach you how to use this information to create an attack strategy.

  2. Generating Evil Files - In this section, I will teach you how to generate evil files (files that will do what you want on the victim's computer). We will talk about backdoors, keyloggers, etc. You will learn how to generate these files for Windows, OS X and Linux operating systems. And that is not all. You will also learn how to make these files bypass antivirus checks, we will make them behave like a normal image or PDF, you will also learn how to embed these files in Microsoft Office documents.

  3. Delivery Methods - In this section, you will learn social engineering methods that will allow you to deliver Trojans to the victim's computer. You will learn how to create fake websites that look like the real thing, how to send email like it was sent by people you can trust. You will also learn how to use fake login pages and fake updates. With the help of them, you can hack into the victim's system. But that's not all, you'll also learn advanced social engineering techniques that will entice the target to visit a malicious URL, and by clicking on it, the target will be hacked.

  4. After hacking - In this section, you will learn how to interact with the system. You will learn how to access the file system, maintain access, change permissions, monitor the target, use the victim's computer as a starting point for hacking the rest of the computers in the system.

This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:

Contents :

Contents of the first part:

Introduction

What is Social Engineering

Teaser - Hacking an Android smartphone. Gaining access to the camera

Course overview

Preparation - Preparing the working environment

Necessary software

Install Kali Linux 2017 as a virtual machine

Install Windows as a virtual machine

Install Ubuntu as virtual machine

Preparing - Linux Basics

Kali Linux Overview

Basic Linux Terminal Commands

Making Snapshots

Updating Installed Programs

Gathering Information

Introduction to Gathering Information

Gathering Information - Gathering Information about Company Website

Maltego Overview

Finding Information about Domain, Finding Email Address

Finding Information about Hosting, Support Mail, Admin Email


Contents of Part 2:

04 Gathering Information - Gathering Information about Company Website

016 - Looking for links to websites related to the victim

017 - Using the collected information to create an attack strategy

05 Gathering information - Gathering Information about the Person

018 - Looking for links to social networks

019 - Looking for linked Twitter accounts of friends

020 - Looking for E-mail friends of the victim

021 - We analyze the information received, create an attack strategy

06 Wicked Windows Files

022 - Introduction

07 Wicked Windows Files - Generating a Backdoor that Antiviruses can't see

023 - Installing Veil 3.0

024 - Veil Overview, Payload Basics

025 - Generating a Backdoor with Veil 3 that Antiviruses can't see

026 - Waiting for Incoming Connections

027 - Hacking a Windows machine using the generated Backdoor


Contents of the third part:

07 Evil Windows Files - Generating a Backdoor that Antiviruses can't see

028 - Installing The Fat Rat

029 - Generating an invisible backdoor using The Fat Rat

030 - Installing Empire

031 - Creating an Empire Foxner

032 - Create Powershell Stager, Hack Windows 10

033 - Modifying the Backdoor source, bypassing the antivirus

08 Evil Files - Surveillance

034 - What is a Keylogger

035 - Creating a remote Keylogger

036 - Capturing passwords with Keylogger

037 - Extracting passwords basics

038 - Extracting passwords from a local machine


Contents of the fourth part:

08 Evil Files - Surveillance

039 - Extract passwords from a remote machine

09 Evil Files - Improve evil files

040 - Bypass all antiviruses. Modify Hex Values

041 - Download and Execute Payload

042 - Build the Perfect Spying Tool

10 Evil Files - Convert Evil Files to Trojans

043 - We embed evil files in any files, for example, in images, PDF, MP4

044 - Invisibly launch evil files in the background

045 - Change the Trojan icon

046 - Mask the .exe file extension to any other (pdf, png, etc.)

047 - Download and Execute Payload (Payload download and run files). The second way


Contents of the fifth part:

10 Evil Files - Convert evil files to Trojans

048 - Embed evil files in any files, such as images, PDF, MP4. Method Two

049 - Embedding a Backdoor in a Real Microsoft Office Document

050 - Embedding Any Evil Files in a Real Microsoft Office Document

11 Mac OS X Evil Files

051 - Introduction

052 - Hacking Mac OS X with the Meterpreter Backdoor

053 - Hacking Mac OS X using the Empire stager

054 - Converting the backdoor to an executable file

055 - Connecting a normal file to the backdoor

056 - Download and Execute Payload (Payload of downloading and running files)

057 - Changing the icon of the trojan

058 - Hidden launch of trojans

059 - Embedding backdoor to a real Microsoft Office document
Contents of the sixth part:

12 Evil Linux files

060 - Hacking Linux with one command

061 - More advanced backdoors for Linux

062 - Installing a remote kilologger

063 - Recording everything a user types with a remote kilologger

064 - Retrieving saved passwords from local machine

065 - Payload launch and send report

066 - Retrieving saved passwords from a remote machine

067 - Embedding malicious code in a real Linux package - Part 1

068 - Embedding malicious code in a real Linux package - Part 2 069 - Embedding a backdoor

in a real Android application purpose) 070 - Introduction 071 - Preparing malicious files to be sent via URL 072 - Email spoofing - Sending messages from other addresses 073 - Hacking OS X and Linux using pure social engineering 074 - Creating a copy of the authorization page of any site 075 - Stealing credentials from using a fake login page 076 - Getting to know BeEF, the basics

077 - Embed Hook BeEF in web pages

078 - Lure the target, convince them to follow the link

079 - Basic BeEF commands

080 - Steal credentials with a fake authorization request

081 - Hack Windows 10 with a fake update

082 - Hack OS X with a fake update 083 - Hacking Linux

with a fake update outside the home network 15 After hacking 088 - Introduction



089 - Upgrading Basic Shell Access to Meterpreter/Empire

090 - Automatic Run Commands on Reverse Connection Establishment

16 After the Hack - Meterpreter

091 - Meterpreter Basics

092 - Filesystem Commands

093 - Access Support - Basic Methods

094 - Access Support - Use a Secure Stealth Method

095 - Surveillance - Capturing keystrokes - Taking screenshots

096 - Pivoting - Theory. What is Pivoting

097 - Pivoting - We hack devices that are on the same network with us


Contents 9 parts:

16 After hacking - Meterpreter

098 - Manage an Android smartphone - Get access to the microphone, camera, file system, etc.

099 - Access support on Mac OS X

17 After the Hack - Empire

100 - Agent Basics

101 - File System Commands

102 - Shell Commands for Uploading Files to the Victim's Machine

103 - Injecting a Backdoor Process into the System Process

104 - Stealing the Root User's Password. Elevating Permissions in OS X

105 - Maintaining Access on OS X

18 Security

106 - Exposing Fake Emails

107 - How to Protect Against BeEF and Other Browser Exploits

108 - Manually Detect Trojans

109 - Detect Trojans with Sandbox
[Hidden content]
 
Joined
Jul 19, 2023
Messages
102
Hellcoins
♆233
Udemy - Learning Social Engineering From Scratch
Author (Director): Udemy

Genre: Tutorial

Description:

Social engineering, sometimes referred to as the science and art of hacking the human mind, is becoming increasingly popular due to the rise of social media, email, or other forms of online communication in our lives. In the field of information security, this term is widely used to refer to a number of techniques used by cybercriminals. The latter are aimed at extorting confidential information from victims or inducing victims to commit actions aimed at penetrating the system bypassing the security system.

Duration: 11:54:17

Video quality: PCRec

Translation: One-voice voice-over (Rus)

Video: AVC/H.264, 1280x720, ~3581 Kbps

Audio: AAC, 2 ch, 192 Kbps

Description next:

Learn to hack Windows, Mac OS X, Linux & Android using social engineering.

"Welcome to the complete course on Social Engineering! In this course we will start from the very basics, you do not need to know anything about penetration testing or hacking. We will start with the basics of social engineering and by the end of the course you will be able to hack most popular operating systems systems (Windows, OS X and Linux), learn how to generate various Trojans and install them on the victim's computer using social engineering techniques.

This course focuses on the practical side of hacking, but we won't neglect the theory either. Before we move on to penetration testing, I will show you how to set up a test environment. This will help us safely practice our penetration testing skills on our own machine. The course is divided into 4 main sections:

  1. Collecting Information - In this section, I will teach you how to collect information about the victim. It can be either a company or a website or a person. I will teach you how to collect information that is related to your goal, such as websites, links, companies, list of people, email addresses, phone numbers, friends list, social media accounts, etc. I will also teach you how to use this information to create an attack strategy.

  2. Generating Evil Files - In this section, I will teach you how to generate evil files (files that will do what you want on the victim's computer). We will talk about backdoors, keyloggers, etc. You will learn how to generate these files for Windows, OS X and Linux operating systems. And that is not all. You will also learn how to make these files bypass antivirus checks, we will make them behave like a normal image or PDF, you will also learn how to embed these files in Microsoft Office documents.

  3. Delivery Methods - In this section, you will learn social engineering methods that will allow you to deliver Trojans to the victim's computer. You will learn how to create fake websites that look like the real thing, how to send email like it was sent by people you can trust. You will also learn how to use fake login pages and fake updates. With the help of them, you can hack into the victim's system. But that's not all, you'll also learn advanced social engineering techniques that will entice the target to visit a malicious URL, and by clicking on it, the target will be hacked.

  4. After hacking - In this section, you will learn how to interact with the system. You will learn how to access the file system, maintain access, change permissions, monitor the target, use the victim's computer as a starting point for hacking the rest of the computers in the system.

This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:

Contents :

Contents of the first part:

Introduction

What is Social Engineering

Teaser - Hacking an Android smartphone. Gaining access to the camera

Course overview

Preparation - Preparing the working environment

Necessary software

Install Kali Linux 2017 as a virtual machine

Install Windows as a virtual machine

Install Ubuntu as virtual machine

Preparing - Linux Basics

Kali Linux Overview

Basic Linux Terminal Commands

Making Snapshots

Updating Installed Programs

Gathering Information

Introduction to Gathering Information

Gathering Information - Gathering Information about Company Website

Maltego Overview

Finding Information about Domain, Finding Email Address

Finding Information about Hosting, Support Mail, Admin Email


Contents of Part 2:

04 Gathering Information - Gathering Information about Company Website

016 - Looking for links to websites related to the victim

017 - Using the collected information to create an attack strategy

05 Gathering information - Gathering Information about the Person

018 - Looking for links to social networks

019 - Looking for linked Twitter accounts of friends

020 - Looking for E-mail friends of the victim

021 - We analyze the information received, create an attack strategy

06 Wicked Windows Files

022 - Introduction

07 Wicked Windows Files - Generating a Backdoor that Antiviruses can't see

023 - Installing Veil 3.0

024 - Veil Overview, Payload Basics

025 - Generating a Backdoor with Veil 3 that Antiviruses can't see

026 - Waiting for Incoming Connections

027 - Hacking a Windows machine using the generated Backdoor


Contents of the third part:

07 Evil Windows Files - Generating a Backdoor that Antiviruses can't see

028 - Installing The Fat Rat

029 - Generating an invisible backdoor using The Fat Rat

030 - Installing Empire

031 - Creating an Empire Foxner

032 - Create Powershell Stager, Hack Windows 10

033 - Modifying the Backdoor source, bypassing the antivirus

08 Evil Files - Surveillance

034 - What is a Keylogger

035 - Creating a remote Keylogger

036 - Capturing passwords with Keylogger

037 - Extracting passwords basics

038 - Extracting passwords from a local machine


Contents of the fourth part:

08 Evil Files - Surveillance

039 - Extract passwords from a remote machine

09 Evil Files - Improve evil files

040 - Bypass all antiviruses. Modify Hex Values

041 - Download and Execute Payload

042 - Build the Perfect Spying Tool

10 Evil Files - Convert Evil Files to Trojans

043 - We embed evil files in any files, for example, in images, PDF, MP4

044 - Invisibly launch evil files in the background

045 - Change the Trojan icon

046 - Mask the .exe file extension to any other (pdf, png, etc.)

047 - Download and Execute Payload (Payload download and run files). The second way


Contents of the fifth part:

10 Evil Files - Convert evil files to Trojans

048 - Embed evil files in any files, such as images, PDF, MP4. Method Two

049 - Embedding a Backdoor in a Real Microsoft Office Document

050 - Embedding Any Evil Files in a Real Microsoft Office Document

11 Mac OS X Evil Files

051 - Introduction

052 - Hacking Mac OS X with the Meterpreter Backdoor

053 - Hacking Mac OS X using the Empire stager

054 - Converting the backdoor to an executable file

055 - Connecting a normal file to the backdoor

056 - Download and Execute Payload (Payload of downloading and running files)

057 - Changing the icon of the trojan

058 - Hidden launch of trojans

059 - Embedding backdoor to a real Microsoft Office document
Contents of the sixth part:

12 Evil Linux files

060 - Hacking Linux with one command

061 - More advanced backdoors for Linux

062 - Installing a remote kilologger

063 - Recording everything a user types with a remote kilologger

064 - Retrieving saved passwords from local machine

065 - Payload launch and send report

066 - Retrieving saved passwords from a remote machine

067 - Embedding malicious code in a real Linux package - Part 1

068 - Embedding malicious code in a real Linux package - Part 2 069 - Embedding a backdoor

in a real Android application purpose) 070 - Introduction 071 - Preparing malicious files to be sent via URL 072 - Email spoofing - Sending messages from other addresses 073 - Hacking OS X and Linux using pure social engineering 074 - Creating a copy of the authorization page of any site 075 - Stealing credentials from using a fake login page 076 - Getting to know BeEF, the basics

077 - Embed Hook BeEF in web pages

078 - Lure the target, convince them to follow the link

079 - Basic BeEF commands

080 - Steal credentials with a fake authorization request

081 - Hack Windows 10 with a fake update

082 - Hack OS X with a fake update 083 - Hacking Linux

with a fake update outside the home network 15 After hacking 088 - Introduction



089 - Upgrading Basic Shell Access to Meterpreter/Empire

090 - Automatic Run Commands on Reverse Connection Establishment

16 After the Hack - Meterpreter

091 - Meterpreter Basics

092 - Filesystem Commands

093 - Access Support - Basic Methods

094 - Access Support - Use a Secure Stealth Method

095 - Surveillance - Capturing keystrokes - Taking screenshots

096 - Pivoting - Theory. What is Pivoting

097 - Pivoting - We hack devices that are on the same network with us


Contents 9 parts:

16 After hacking - Meterpreter

098 - Manage an Android smartphone - Get access to the microphone, camera, file system, etc.

099 - Access support on Mac OS X

17 After the Hack - Empire

100 - Agent Basics

101 - File System Commands

102 - Shell Commands for Uploading Files to the Victim's Machine

103 - Injecting a Backdoor Process into the System Process

104 - Stealing the Root User's Password. Elevating Permissions in OS X

105 - Maintaining Access on OS X

18 Security

106 - Exposing Fake Emails

107 - How to Protect Against BeEF and Other Browser Exploits

108 - Manually Detect Trojans

109 - Detect Trojans with Sandbox
[Hidden content]
wow
 
Joined
Sep 28, 2023
Messages
47
Hellcoins
♆87
  1. kdoors, keyloggers, etc. You will learn how to generate these files for Windows, OS X and Linux operating systems. And that is not all. You will also learn how to make these files bypass antivirus checks, we will make them behave like a normal image or PDF, you will also learn how to embed these files in Microsoft Office documents.

  2. Delivery Methods - In this section, you will learn social engineering methods that will allow you to deliver Trojans to the victim's computer. You will learn how to create fake websites that look like the real thing, how to send email like it was sent by people you can trust. You will also learn how to use fake login pages and fake updates. With the help of them, you can hack into the victim's system. But that's not all, you'll also learn advanced social engineering techniques that will entice the target to visit a malicious URL, and by clicking on it, the target will be hacked.

  3. After hacking - In this section, you will learn how to interact with the system. You will learn how to access the file system, maintain access, change permissions, monitor the target, use the victim's computer as a starting point for hacking the rest of the computers in the system.

This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:

Contents :

Contents of the first part:

Introduction

What is Social Engineering

Teaser - Hacking an Android smartphone. Gaining access to the camera

Course overview

Preparation - Preparing the working environment

Necessary software

Install Kali Linux 2017 as a virtual machine

Install Windows as a virtual machine

Install Ubuntu as virtual machine

Preparing - Linux Basics

Kali Linux Overview

Basic Linux Terminal Commands

Making Snapshots

Updating Installed Programs

Gathering Information

Introduction to Gathering Information

Gathering Information - Gathering Information about Company Website

Maltego Overview

Finding Information about Domain, Finding Email Address

Finding Information about Hosting, Support Mail, Admin Email


Contents of Part 2:

04 Gathering Information - Gathering Information about Company Website

016 - Looking for links to websites related to the victim
 
Top