- Introduction 4
- TeaserLecture1.1
 - Introduction to Hacking Using The CloudLecture1.2
 - What is The Cloud?Lecture1.305 min
 - Why Learn Cloud Computing?Lecture1.402 min
 
 - Basics 5
- Introduction to Cloud BasicsLecture2.1
 - Signing Up With AWSLecture2.204 min
 - Installing Kali Linux On The CloudLecture2.309 min
 - Communicating With Cloud Computers Remotely Using SSHLecture2.406 min
 - Linux Terminal BasicsLecture2.510 min
 
 - Phishing 10
- Introduction to PhishingLecture3.1
 - File Hosting & Firewall SettingsLecture3.209 min
 - Cloning Websites & Uploading Them to The CloudLecture3.308 min
 - Creating a Fake Login Page On The CloudLecture3.405 min
 - Modifying the Page to Steal Login InformationLecture3.507 min
 - Stealing Facebook Login Using an Identical Fake Login PageLecture3.610 min
 - Domain Name & DNS BasicsLecture3.709 min
 - Linking Domain Names to Phishing PagesLecture3.807 min
 - Introduction to HTTPSLecture3.906 min
 - Enabling HTTPS on Phishing PagesLecture3.1008 min
 
 - Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA) 3
- Introduction to EvilginxLecture4.107 min
 - Installing Evilginx on the CloudLecture4.206 min
 - Bypassing 2FA / MFALecture4.309 min
 
 - Accessing Cloud Server Desktop 2
- Introduction and Main SetupLecture5.104 min
 - Accessing The Desktop of Cloud ServersLecture5.210 min
 
 - BitB - Browser In Browser Attack 6
- Introduction to Browser in Browser AttackLecture6.108 min
 - Polishing the Connection & Installing a BrowserLecture6.205 min
 - Building a Malicious BrowserLecture6.308 min
 - Enhancing the URLLecture6.405 min
 - Hacking Gmail & Bypassing 2FA / MFALecture6.507 min
 - Hacking WhatsappLecture6.6
 
 - Mobile BitB - Mobile Friendly Phishing & 2FA Bypass 4
- Mobile Friendly Phishing PagesLecture7.109 min
 - Hiding the CursorLecture7.209 min
 - Installing & Configuring a Virtual KeyboardLecture7.307 min
 - Hacking Gmail on Mobile DevicesLecture7.407 min
 
 - Multi-BitB Attack 3
- Establishing Multiple Independent ConnectionsLecture8.109 min
 - Creating Independent User SessionsLecture8.207 min
 - Stealing Gmail & Facebook Logins From Multiple DevicesLecture8.309 min
 
 - Hacking Web Browsers 8
- Introduction to Browser HackingLecture9.1
 - Installing Needed SoftwareLecture9.213 min
 - Embedding Evil Code in Cloned WebsitesLecture9.310 min
 - Enabling HTTPS on Malicious PagesLecture9.412 min
 - Windows & Apple Mac OS Web Browser HackingLecture9.505 min
 - Programming Custom Evil Pages to Access the Target’s Location & OSLecture9.607 min
 - Automatically Storing Gathered Information on the CloudLecture9.713 min
 - URL ManipulationLecture9.805 min
 
 - Command & Control Servers (C2 / C&C) 2
- Introduction to Command & Control ServersLecture10.102 min
 - What is a C2 & Which is the best?Lecture10.207 min
 
 - Hacking Windows, Linux & Apple Mac OS 5
- Introduction to Empire & StarkillerLecture11.108 min
 - Interacting with StarkillerLecture11.206 min
 - Receiving Backdoor Connections From the CloudLecture11.310 min
 - Creating a Windows Backdoor Using StarkillerLecture11.407 min
 - Hacking & Controlling Windows 11 Through the CloudLecture11.505 min
 
 - Post Exploitation With StarKiller 6
- File System Access & Executing System CommandsLecture12.109 min
 - StarKiller Modules BasicsLecture12.207 min
 - Finding Sensitive Data on Windows & Module FilteringLecture12.306 min
 - Stealing Windows PasswordsLecture12.405 min
 - Capturing Keystrikes & Copied PasswordsLecture12.505 min
 - Launching a Ransomeware AttackLecture12.6
 
 - Hacking Windows Using Discord as a C2 4
- Introduction & SetupLecture13.105 min
 - Creating a Discord ServerLecture13.206 min
 - Weaponising a Discord ServerLecture13.304 min
 - Hacking Windows 11 Through DiscordLecture13.408 min
 
 - Windows Post Exploitation via Discord 4
- Getting Computer info, Location & Stored PasswordsLecture14.106 min
 - Remotely Executing System Commands & Getting a Reverse ShellLecture14.208 min
 - Remote File System Management With Upload & DownloadLecture14.306 min
 - Remote Webcam & Keyboard AccessLecture14.4
 
 - Creating Windows Trojans 3
- Introduction to TrojansLecture15.1
 - Creating a Basic TrojanLecture15.209 min
 - Improving Torjan’s Icon & BehaviourLecture15.303 min
 
 - Creating Apple Mac OS & Linux Trojans 3
- Generating a Basic Apple and Linux BackdoorLecture16.106 min
 - Hacking Apple Mac OS Using a TrojanLecture16.212 min
 - Hacking Linux Using a TrojanLecture16.311 min
 
 - Advanced Malware Delivery 7
- Introduction to Advanced Delivery MethodsLecture17.1
 - Introduction to self-hosting + demoLecture17.206 min
 - Installing a File Sharing Service on The CloudLecture17.306 min
 - Manipulating Shared Files on The CloudLecture17.408 min
 - Hiding / Replacing File Type & ExtensionLecture17.503 min
 - Manually Enabling HTTPSLecture17.607 min
 - Cross-Platform Malware DeliveryLecture17.709 min
 
 - Bonus Section 1
- Bonus LectureLecture18.1
 
 
This content is protected, please login and enroll course to view this content!
