-
Introduction 4
-
TeaserLecture1.1
-
Introduction to Hacking Using The CloudLecture1.2
-
What is The Cloud?Lecture1.305 min
-
Why Learn Cloud Computing?Lecture1.402 min
-
-
Basics 5
-
Introduction to Cloud BasicsLecture2.1
-
Signing Up With AWSLecture2.204 min
-
Installing Kali Linux On The CloudLecture2.309 min
-
Communicating With Cloud Computers Remotely Using SSHLecture2.406 min
-
Linux Terminal BasicsLecture2.510 min
-
-
Phishing 10
-
Introduction to PhishingLecture3.1
-
File Hosting & Firewall SettingsLecture3.209 min
-
Cloning Websites & Uploading Them to The CloudLecture3.308 min
-
Creating a Fake Login Page On The CloudLecture3.405 min
-
Modifying the Page to Steal Login InformationLecture3.507 min
-
Stealing Facebook Login Using an Identical Fake Login PageLecture3.610 min
-
Domain Name & DNS BasicsLecture3.709 min
-
Linking Domain Names to Phishing PagesLecture3.807 min
-
Introduction to HTTPSLecture3.906 min
-
Enabling HTTPS on Phishing PagesLecture3.1008 min
-
-
Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA) 3
-
Introduction to EvilginxLecture4.107 min
-
Installing Evilginx on the CloudLecture4.206 min
-
Bypassing 2FA / MFALecture4.309 min
-
-
Accessing Cloud Server Desktop 2
-
Introduction and Main SetupLecture5.104 min
-
Accessing The Desktop of Cloud ServersLecture5.210 min
-
-
BitB - Browser In Browser Attack 6
-
Introduction to Browser in Browser AttackLecture6.108 min
-
Polishing the Connection & Installing a BrowserLecture6.205 min
-
Building a Malicious BrowserLecture6.308 min
-
Enhancing the URLLecture6.405 min
-
Hacking Gmail & Bypassing 2FA / MFALecture6.507 min
-
Hacking WhatsappLecture6.6
-
-
Mobile BitB - Mobile Friendly Phishing & 2FA Bypass 4
-
Mobile Friendly Phishing PagesLecture7.109 min
-
Hiding the CursorLecture7.209 min
-
Installing & Configuring a Virtual KeyboardLecture7.307 min
-
Hacking Gmail on Mobile DevicesLecture7.407 min
-
-
Multi-BitB Attack 3
-
Establishing Multiple Independent ConnectionsLecture8.109 min
-
Creating Independent User SessionsLecture8.207 min
-
Stealing Gmail & Facebook Logins From Multiple DevicesLecture8.309 min
-
-
Hacking Web Browsers 8
-
Introduction to Browser HackingLecture9.1
-
Installing Needed SoftwareLecture9.213 min
-
Embedding Evil Code in Cloned WebsitesLecture9.310 min
-
Enabling HTTPS on Malicious PagesLecture9.412 min
-
Windows & Apple Mac OS Web Browser HackingLecture9.505 min
-
Programming Custom Evil Pages to Access the Target’s Location & OSLecture9.607 min
-
Automatically Storing Gathered Information on the CloudLecture9.713 min
-
URL ManipulationLecture9.805 min
-
-
Command & Control Servers (C2 / C&C) 2
-
Introduction to Command & Control ServersLecture10.102 min
-
What is a C2 & Which is the best?Lecture10.207 min
-
-
Hacking Windows, Linux & Apple Mac OS 5
-
Introduction to Empire & StarkillerLecture11.108 min
-
Interacting with StarkillerLecture11.206 min
-
Receiving Backdoor Connections From the CloudLecture11.310 min
-
Creating a Windows Backdoor Using StarkillerLecture11.407 min
-
Hacking & Controlling Windows 11 Through the CloudLecture11.505 min
-
-
Post Exploitation With StarKiller 6
-
File System Access & Executing System CommandsLecture12.109 min
-
StarKiller Modules BasicsLecture12.207 min
-
Finding Sensitive Data on Windows & Module FilteringLecture12.306 min
-
Stealing Windows PasswordsLecture12.405 min
-
Capturing Keystrikes & Copied PasswordsLecture12.505 min
-
Launching a Ransomeware AttackLecture12.6
-
-
Hacking Windows Using Discord as a C2 4
-
Introduction & SetupLecture13.105 min
-
Creating a Discord ServerLecture13.206 min
-
Weaponising a Discord ServerLecture13.304 min
-
Hacking Windows 11 Through DiscordLecture13.408 min
-
-
Windows Post Exploitation via Discord 4
-
Getting Computer info, Location & Stored PasswordsLecture14.106 min
-
Remotely Executing System Commands & Getting a Reverse ShellLecture14.208 min
-
Remote File System Management With Upload & DownloadLecture14.306 min
-
Remote Webcam & Keyboard AccessLecture14.4
-
-
Creating Windows Trojans 3
-
Introduction to TrojansLecture15.1
-
Creating a Basic TrojanLecture15.209 min
-
Improving Torjan’s Icon & BehaviourLecture15.303 min
-
-
Creating Apple Mac OS & Linux Trojans 3
-
Generating a Basic Apple and Linux BackdoorLecture16.106 min
-
Hacking Apple Mac OS Using a TrojanLecture16.212 min
-
Hacking Linux Using a TrojanLecture16.311 min
-
-
Advanced Malware Delivery 7
-
Introduction to Advanced Delivery MethodsLecture17.1
-
Introduction to self-hosting + demoLecture17.206 min
-
Installing a File Sharing Service on The CloudLecture17.306 min
-
Manipulating Shared Files on The CloudLecture17.408 min
-
Hiding / Replacing File Type & ExtensionLecture17.503 min
-
Manually Enabling HTTPSLecture17.607 min
-
Cross-Platform Malware DeliveryLecture17.709 min
-
-
Bonus Section 1
-
Bonus LectureLecture18.1
-
This content is protected, please login and enroll course to view this content!
