Curriculum
- Introduction
- Preparation - Creating a Penetration Testing Lab
- Preparation - Linux Basics
- Information Gathering
- Information Gathering - Gathering Info About A Company/Website
- Information Gathering - Gathering Info About A Person
- Windows Malware
- Windows Malware - Generating Undetectable Backdoors
- Backdoors and Payloads Basics
- Creating Your Own Backdoor
- Listening for Backdoor Connections
- Hacking Windows 11 Using Your Own Backdoor
- Introduction to The Fat Rat
- Generating An Undetectable Backdoor for Windows – Method 2
- Introduction to Empire
- Creating a Windows Powershell Stager & Hacking Windows 10
- Modifying Backdoor Source To Bypass All Anti-virus Programs
- Windows Malware - Spying
- Windows Malware - Enhancing Malware
- Windows Malware - Creating Trojans
- Embedding Malware With Any File Type Like An Image Or PDF
- Running Malware Silently In The Background
- Changing Trojan’s Icon
- Spoofing File Extension From .exe to Anything Else (pdf, png ..etc)
- Download & Execute Payload (Method 2)
- Embedding Malware With Any File Type Like An Image Or PDF (Method 2)
- Embedding a Backdoor In Microsoft Office Document
- Embedding Any Malware in a Microsoft Office Document
- Mac OS X Malware
- Linux Malware
- Installing Ubuntu As a Virtual Machine
- Hacking Into Linux-Like Systems Using One Command
- More Advanced Linux Backdoor
- Using A Remote Keylogger To Capture Key Strikes Including Passwords
- Recovering Saved Passwords From A Local Machine
- Execute & Report Payload
- Recovering Saved Passwords From A Remote Machine
- Embedding Evil Code In A Legitimate Linux Package – Part 1
- Embedding Evil Code In A Legitimate Linux Package – Part 2
- Backdooring a Legitimate Android App
- Delivery Methods
- Introduction
- Mail Deliver – Setting up an SMTP Server
- Mail Delivery – Spoofing Emails
- Mail Delivery – Spoofing Email Name
- Mail Delivery – Spoofing Emails (method 2)
- Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files
- Creating A Replica Of Any Website / Login Page
- Stealing Login Info Using Fake A Login Page
- BeEF Overview & Basic Hook Method
- Injecting BeEF’s Hook In Any Webpage
- URL Manipulation
- Luring Target Into Accessing Evil URL Without Direct Interaction
- Basic BeEF Commands
- Stealing Credentials/Passwords Using A Fake Login Prompt
- Hacking Windows 10 Using A Fake Update
- Hacking Mac OS X Using A Fake Update
- Hacking Linux Using A Fake Update
- Using The Above Attacks Outside The Local Network
- Post Exploitation
- Post Exploitation - Meterpreter
- Meterpreter Basics
- File System Commands
- Maintaining Access (Persistence)
- Spying – Capturing Key Strikes & Taking Screen Shots
- Pivoting – Theory (What is Pivoting?)
- Pivoting – Exploiting Devices on The Same Network As The Hacked Computer
- Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More
- Maintaining Access On OS X
- Post Exploitation - Empire
- Security
- Bonus Section
3tibi
يستاهل الكورس
شريت الحزمة كاملة ومن البداية انصدمت من قوة الدورة كل شي يوفرونه لك حتى نسخة كالي معدلة وان شاء الله مو آخر مرةBernard Kimanzi Kiema
The lectures are well taught and explanation are perfect,simple and easy to understand.Well prepared.I have already registered for another course expecting to get the same well planned content. Zaid 5 star no doubt.