-
Bernard Kimanzi Kiema
The lectures are well taught and explanation are perfect,simple and easy to understand.Well prepared.I have already registered for another course expecting to get the same well planned content. Zaid 5 star no doubt. -
Femi
I bought 3 course, and they have been eye opening so far. Amazing instructor.
Curriculum
-
Introduction
-
Preparation - Creating a Penetration Testing Lab
-
Preparation - Linux Basics
-
Information Gathering
-
Information Gathering - Gathering Info About A Company/Website
-
Information Gathering - Gathering Info About A Person
-
Windows Malware
-
Windows Malware - Generating Undetectable Backdoors
- Installing Veil Framework
- Veil Overview & Payloads Basics
- Generating An Undetectable Backdoors For Windows
- Listening For Incoming Connections
- Hacking A Windows 10 Machine Using The Generated Backdoor
- Introduction to The Fat Rat
- Generating An Undetectable Backdoor for Windows – Method 2
- Introduction to Empire
- Creating a Windows Powershell Stager & Hacking Windows 10
- Modifying Backdoor Source To Bypass All Anti-virus Programs
-
Windows Malware - Spying
-
Windows Malware - Enhancing Malware
-
Windows Malware - Creating Trojans
- Download & Execute Payload
- Embedding Evil Files With Any File Type Like An Image Or PDF
- Running Evil Files Silently In The Background
- Changing Trojan’s Icon
- Spoofing File Extension From .exe to Anything Else (pdf, png ..etc)
- Download & Execute Payload (Method 2)
- Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)
- Embedding backdoor In A Legitimate Microsoft Office Document
- Embedding Any Evil File In A Legitimate Microsoft Office Document
-
Mac OS X Malware
- Introduction
- Hacking Mac OS X Using A Meterpreter Backdoor
- Hacking Mac OS X Using An Empire Stager
- Converting Basic Backdoor To An Executable
- Embedding A Normal File With Backdoor
- Generating a Basic Trojan For Max OS X
- Changing Trojan’s Icon
- Configuring The Trojan To Run Silently
- Embedding Backdoor In A Legitimate Microsoft Office Document
-
Linux Malware
- Installing Ubuntu As a Virtual Machine
- Hacking Into Linux-Like Systems Using One Command
- More Advanced Linux Backdoor
- Using A Remote Keylogger To Capture Key Strikes Including Passwords
- Recovering Saved Passwords From A Local Machine
- Execute & Report Payload
- Recovering Saved Passwords From A Remote Machine
- Embedding Evil Code In A Legitimate Linux Package – Part 1
- Embedding Evil Code In A Legitimate Linux Package – Part 2
- Backdooring a Legitimate Android App
-
Delivery Methods
- Introduction
- Mail Deliver – Setting up an SMTP Server
- Mail Delivery – Spoofing Emails
- Mail Delivery – Spoofing Emails (method 2)
- Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files
- Creating A Replica Of Any Website / Login Page
- Stealing Login Info Using Fake A Login Page
- BeEF Overview & Basic Hook Method
- Injecting BeEF’s Hook In Any Webpage
- URL Manipulation
- Luring Target Into Accessing Evil URL Without Direct Interaction
- Basic BeEF Commands
- Stealing Credentials/Passwords Using A Fake Login Prompt
- Hacking Windows 10 Using A Fake Update
- Hacking Mac OS X Using A Fake Update
- Hacking Linux Using A Fake Update
-
Using The Above Attacks Outside The Local Network
-
Post Exploitation
-
Post Exploitation - Meterpreter
- Meterpreter Basics
- File System Commands
- Maintaining Access (Persistence)
- Spying – Capturing Key Strikes & Taking Screen Shots
- Pivoting – Theory (What is Pivoting?)
- Pivoting – Exploiting Devices on The Same Network As The Hacked Computer
- Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More
- Maintaining Access On OS X
-
Post Exploitation - Empire
-
Security
-
Bonus Section