- Introduction 4
- TeaserLecture1.1
- Introduction to Hacking Using The CloudLecture1.2
- What is The Cloud?Lecture1.305 min
- Why Learn Cloud Computing?Lecture1.402 min
- Basics 5
- Introduction to Cloud BasicsLecture2.1
- Signing Up With AWSLecture2.204 min
- Installing Kali Linux On The CloudLecture2.309 min
- Communicating With Cloud Computers Remotely Using SSHLecture2.406 min
- Linux Terminal BasicsLecture2.510 min
- Phishing 10
- Introduction to PhishingLecture3.1
- File Hosting & Firewall SettingsLecture3.209 min
- Cloning Websites & Uploading Them to The CloudLecture3.308 min
- Creating a Fake Login Page On The CloudLecture3.405 min
- Modifying the Page to Steal Login InformationLecture3.507 min
- Stealing Facebook Login Using an Identical Fake Login PageLecture3.610 min
- Domain Name & DNS BasicsLecture3.709 min
- Linking Domain Names to Phishing PagesLecture3.807 min
- Introduction to HTTPSLecture3.906 min
- Enabling HTTPS on Phishing PagesLecture3.1008 min
- Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA) 3
- Introduction to EvilginxLecture4.107 min
- Installing Evilginx on the CloudLecture4.206 min
- Bypassing 2FA / MFALecture4.309 min
- Accessing Cloud Server Desktop 2
- Introduction and Main SetupLecture5.104 min
- Accessing The Desktop of Cloud ServersLecture5.210 min
- BitB - Browser In Browser Attack 6
- Introduction to Browser in Browser AttackLecture6.108 min
- Polishing the Connection & Installing a BrowserLecture6.205 min
- Building a Malicious BrowserLecture6.308 min
- Enhancing the URLLecture6.405 min
- Hacking Gmail & Bypassing 2FA / MFALecture6.507 min
- Hacking WhatsappLecture6.6
- Mobile BitB - Mobile Friendly Phishing & 2FA Bypass 4
- Mobile Friendly Phishing PagesLecture7.109 min
- Hiding the CursorLecture7.209 min
- Installing & Configuring a Virtual KeyboardLecture7.307 min
- Hacking Gmail on Mobile DevicesLecture7.407 min
- Multi-BitB Attack 3
- Establishing Multiple Independent ConnectionsLecture8.109 min
- Creating Independent User SessionsLecture8.207 min
- Stealing Gmail & Facebook Logins From Multiple DevicesLecture8.309 min
- Hacking Web Browsers 8
- Introduction to Browser HackingLecture9.1
- Installing Needed SoftwareLecture9.213 min
- Embedding Evil Code in Cloned WebsitesLecture9.310 min
- Enabling HTTPS on Malicious PagesLecture9.412 min
- Windows & Apple Mac OS Web Browser HackingLecture9.505 min
- Programming Custom Evil Pages to Access the Target’s Location & OSLecture9.607 min
- Automatically Storing Gathered Information on the CloudLecture9.713 min
- URL ManipulationLecture9.805 min
- Command & Control Servers (C2 / C&C) 2
- Introduction to Command & Control ServersLecture10.102 min
- What is a C2 & Which is the best?Lecture10.207 min
- Hacking Windows, Linux & Apple Mac OS 5
- Introduction to Empire & StarkillerLecture11.108 min
- Interacting with StarkillerLecture11.206 min
- Receiving Backdoor Connections From the CloudLecture11.310 min
- Creating a Windows Backdoor Using StarkillerLecture11.407 min
- Hacking & Controlling Windows 11 Through the CloudLecture11.505 min
- Post Exploitation With StarKiller 6
- File System Access & Executing System CommandsLecture12.109 min
- StarKiller Modules BasicsLecture12.207 min
- Finding Sensitive Data on Windows & Module FilteringLecture12.306 min
- Stealing Windows PasswordsLecture12.405 min
- Capturing Keystrikes & Copied PasswordsLecture12.505 min
- Launching a Ransomeware AttackLecture12.6
- Hacking Windows Using Discord as a C2 4
- Introduction & SetupLecture13.105 min
- Creating a Discord ServerLecture13.206 min
- Weaponising a Discord ServerLecture13.304 min
- Hacking Windows 11 Through DiscordLecture13.408 min
- Windows Post Exploitation via Discord 4
- Getting Computer info, Location & Stored PasswordsLecture14.106 min
- Remotely Executing System Commands & Getting a Reverse ShellLecture14.208 min
- Remote File System Management With Upload & DownloadLecture14.306 min
- Remote Webcam & Keyboard AccessLecture14.4
- Creating Windows Trojans 3
- Introduction to TrojansLecture15.1
- Creating a Basic TrojanLecture15.209 min
- Improving Torjan’s Icon & BehaviourLecture15.303 min
- Creating Apple Mac OS & Linux Trojans 3
- Generating a Basic Apple and Linux BackdoorLecture16.106 min
- Hacking Apple Mac OS Using a TrojanLecture16.212 min
- Hacking Linux Using a TrojanLecture16.311 min
- Advanced Malware Delivery 7
- Introduction to Advanced Delivery MethodsLecture17.1
- Introduction to self-hosting + demoLecture17.206 min
- Installing a File Sharing Service on The CloudLecture17.306 min
- Manipulating Shared Files on The CloudLecture17.408 min
- Hiding / Replacing File Type & ExtensionLecture17.503 min
- Manually Enabling HTTPSLecture17.607 min
- Cross-Platform Malware DeliveryLecture17.709 min
- Bonus Section 1
- Bonus LectureLecture18.1
Introduction to Hacking Using The Cloud
This is the main course introduction lecture, it’ll introduce you to the main sections and topics of the course that will teach you how to use the cloud for hacking and explain what you’ll learn and how you’ll learn it.
