- Introduction 4
- TeaserLecture1.1
- Introduction to Hacking Using The CloudLecture1.2
- What is The Cloud?Lecture1.305 min
- Why Learn Cloud Computing?Lecture1.402 min
- Basics 5
- Introduction to Cloud BasicsLecture2.1
- Signing Up With AWSLecture2.204 min
- Installing Kali Linux On The CloudLecture2.309 min
- Communicating With Cloud Computers Remotely Using SSHLecture2.406 min
- Linux Terminal BasicsLecture2.510 min
- Phishing 10
- Introduction to PhishingLecture3.1
- File Hosting & Firewall SettingsLecture3.209 min
- Cloning Websites & Uploading Them to The CloudLecture3.308 min
- Creating a Fake Login Page On The CloudLecture3.405 min
- Modifying the Page to Steal Login InformationLecture3.507 min
- Stealing Facebook Login Using an Identical Fake Login PageLecture3.610 min
- Domain Name & DNS BasicsLecture3.709 min
- Linking Domain Names to Phishing PagesLecture3.807 min
- Introduction to HTTPSLecture3.906 min
- Enabling HTTPS on Phishing PagesLecture3.1008 min
- Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA) 3
- Introduction to EvilginxLecture4.107 min
- Installing Evilginx on the CloudLecture4.206 min
- Bypassing 2FA / MFALecture4.309 min
- Accessing Cloud Server Desktop 2
- Introduction and Main SetupLecture5.104 min
- Accessing The Desktop of Cloud ServersLecture5.210 min
- BitB - Browser In Browser Attack 6
- Introduction to Browser in Browser AttackLecture6.108 min
- Polishing the Connection & Installing a BrowserLecture6.205 min
- Building a Malicious BrowserLecture6.308 min
- Enhancing the URLLecture6.405 min
- Hacking Gmail & Bypassing 2FA / MFALecture6.507 min
- Hacking WhatsappLecture6.6
- Mobile BitB - Mobile Friendly Phishing & 2FA Bypass 4
- Mobile Friendly Phishing PagesLecture7.109 min
- Hiding the CursorLecture7.209 min
- Installing & Configuring a Virtual KeyboardLecture7.307 min
- Hacking Gmail on Mobile DevicesLecture7.407 min
- Multi-BitB Attack 3
- Establishing Multiple Independent ConnectionsLecture8.109 min
- Creating Independent User SessionsLecture8.207 min
- Stealing Gmail & Facebook Logins From Multiple DevicesLecture8.309 min
- Hacking Web Browsers 8
- Introduction to Browser HackingLecture9.1
- Installing Needed SoftwareLecture9.213 min
- Embedding Evil Code in Cloned WebsitesLecture9.310 min
- Enabling HTTPS on Malicious PagesLecture9.412 min
- Windows & Apple Mac OS Web Browser HackingLecture9.505 min
- Programming Custom Evil Pages to Access the Target’s Location & OSLecture9.607 min
- Automatically Storing Gathered Information on the CloudLecture9.713 min
- URL ManipulationLecture9.805 min
- Command & Control Servers (C2 / C&C) 2
- Introduction to Command & Control ServersLecture10.102 min
- What is a C2 & Which is the best?Lecture10.207 min
- Hacking Windows, Linux & Apple Mac OS 5
- Introduction to Empire & StarkillerLecture11.108 min
- Interacting with StarkillerLecture11.206 min
- Receiving Backdoor Connections From the CloudLecture11.310 min
- Creating a Windows Backdoor Using StarkillerLecture11.407 min
- Hacking & Controlling Windows 11 Through the CloudLecture11.505 min
- Post Exploitation With StarKiller 6
- File System Access & Executing System CommandsLecture12.109 min
- StarKiller Modules BasicsLecture12.207 min
- Finding Sensitive Data on Windows & Module FilteringLecture12.306 min
- Stealing Windows PasswordsLecture12.405 min
- Capturing Keystrikes & Copied PasswordsLecture12.505 min
- Launching a Ransomeware AttackLecture12.6
- Hacking Windows Using Discord as a C2 4
- Introduction & SetupLecture13.105 min
- Creating a Discord ServerLecture13.206 min
- Weaponising a Discord ServerLecture13.304 min
- Hacking Windows 11 Through DiscordLecture13.408 min
- Windows Post Exploitation via Discord 4
- Getting Computer info, Location & Stored PasswordsLecture14.106 min
- Remotely Executing System Commands & Getting a Reverse ShellLecture14.208 min
- Remote File System Management With Upload & DownloadLecture14.306 min
- Remote Webcam & Keyboard AccessLecture14.4
- Creating Windows Trojans 3
- Introduction to TrojansLecture15.1
- Creating a Basic TrojanLecture15.209 min
- Improving Torjan’s Icon & BehaviourLecture15.303 min
- Creating Apple Mac OS & Linux Trojans 3
- Generating a Basic Apple and Linux BackdoorLecture16.106 min
- Hacking Apple Mac OS Using a TrojanLecture16.212 min
- Hacking Linux Using a TrojanLecture16.311 min
- Advanced Malware Delivery 7
- Introduction to Advanced Delivery MethodsLecture17.1
- Introduction to self-hosting + demoLecture17.206 min
- Installing a File Sharing Service on The CloudLecture17.306 min
- Manipulating Shared Files on The CloudLecture17.408 min
- Hiding / Replacing File Type & ExtensionLecture17.503 min
- Manually Enabling HTTPSLecture17.607 min
- Cross-Platform Malware DeliveryLecture17.709 min
- Bonus Section 1
- Bonus LectureLecture18.1
Hacking Whatsapp
This lecture will teach you how to use the browser in browser attack to hack any web enabled service such as WhatsApp.
