-
Introduction 3
-
Teaser – Hacking An Android Phone & Accessing The CameraLecture1.1
-
Introduction to Social EngineeringLecture1.203 min
-
Course OverviewLecture1.304 min
-
-
Preparation - Creating a Penetration Testing Lab 5
-
Lab Overview & Needed SoftwareLecture2.106 min
-
Initial PreparationLecture2.209 min
-
Installing Kali Linux as a VM on WindowsLecture2.309 min
-
Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
-
Installing Kali Linux as a VM on LinuxLecture2.511 min
-
-
Preparation - Linux Basics 3
-
Kali Linux BasicsLecture3.105 min
-
The Linux Terminal & Basic Linux CommandsLecture3.210 min
-
More Powerful Linux Terminals with AI FeaturesLecture3.305 min
-
-
Information Gathering 1
-
IntroductionLecture4.1
-
-
Information Gathering - Gathering Info About A Company/Website 5
-
Maltego OverviewLecture5.107 min
-
Discovering Domain Info & Emails Associated With TargetLecture5.207 min
-
Discovering Information About Hosting Company, Support Team Emails & Admin EmailLecture5.307 min
-
Discovering Files, Links, Websites & Other Companies Related To TargetLecture5.405 min
-
Using The Gathered Info To Build An Attack StrategyLecture5.5
-
-
Information Gathering - Gathering Info About A Person 4
-
Discovering Websites, Links & Social Networking AccountsLecture6.109 min
-
Discovering Twitter Friends & Associated AccountsLecture6.205 min
-
Discovering Emails Of The Target’s FriendsLecture6.305 min
-
Analysing The Gathered Info & Building An Attack StrategyLecture6.409 min
-
-
Windows Malware 3
-
Introduction to Windows MalwareLecture7.1
-
Installing Windows as a Virtual MachineLecture7.206 min
-
Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture7.305 min
-
-
Windows Malware - Generating Undetectable Backdoors 9
-
Backdoors and Payloads BasicsLecture8.112 min
-
Creating Your Own BackdoorLecture8.208 min
-
Listening for Backdoor ConnectionsLecture8.304 min
-
Hacking Windows 11 Using Your Own BackdoorLecture8.406 min
-
Introduction to The Fat RatLecture8.506 min
-
Generating An Undetectable Backdoor for Windows – Method 2Lecture8.611 min
-
Introduction to EmpireLecture8.708 min
-
Creating a Windows Powershell Stager & Hacking Windows 10Lecture8.808 min
-
Modifying Backdoor Source To Bypass All Anti-virus ProgramsLecture8.908 min
-
-
Windows Malware - Spying 6
-
Introduction to KeyloggersLecture9.106 min
-
Creating A Remote KeyloggerLecture9.209 min
-
Using A Remote Keylogger To Capture Key Strikes Including PasswordsLecture9.308 min
-
Password Recovery BasicsLecture9.407 min
-
Recovering Saved Passwords From Local MachineLecture9.503 min
-
Recovering Saved Passwords From A Remote MachineLecture9.6
-
-
Windows Malware - Enhancing Malware 3
-
Bypassing All Anti-Virus Programs By Modifying Hex ValesLecture10.110 min
-
Download & Execute PayloadLecture10.206 min
-
Creating The Perfect Spying ToolLecture10.3
-
-
Windows Malware - Creating Trojans 8
-
Embedding Malware With Any File Type Like An Image Or PDFLecture11.110 min
-
Running Malware Silently In The BackgroundLecture11.208 min
-
Changing Trojan’s IconLecture11.308 min
-
Spoofing File Extension From .exe to Anything Else (pdf, png ..etc)Lecture11.411 min
-
Download & Execute Payload (Method 2)Lecture11.506 min
-
Embedding Malware With Any File Type Like An Image Or PDF (Method 2)Lecture11.607 min
-
Embedding a Backdoor In Microsoft Office DocumentLecture11.709 min
-
Embedding Any Malware in a Microsoft Office DocumentLecture11.810 min
-
-
Mac OS X Malware 8
-
IntroductionLecture12.103 min
-
Hacking Mac OS X Using A Meterpreter BackdoorLecture12.212 min
-
Hacking Mac OS X Using An Empire StagerLecture12.307 min
-
Converting Basic Backdoor To An ExecutableLecture12.404 min
-
Embedding A Normal File With BackdoorLecture12.509 min
-
Generating a Basic Trojan For Mac OS XLecture12.607 min
-
Changing Trojan’s IconLecture12.706 min
-
Configuring The Trojan To Run SilentlyLecture12.806 min
-
-
Linux Malware 10
-
Installing Ubuntu As a Virtual MachineLecture13.106 min
-
Hacking Into Linux-Like Systems Using One CommandLecture13.209 min
-
More Advanced Linux BackdoorLecture13.307 min
-
Using A Remote Keylogger To Capture Key Strikes Including PasswordsLecture13.4
-
Recovering Saved Passwords From A Local MachineLecture13.507 min
-
Execute & Report PayloadLecture13.607 min
-
Recovering Saved Passwords From A Remote MachineLecture13.707 min
-
Embedding Evil Code In A Legitimate Linux Package – Part 1Lecture13.813 min
-
Embedding Evil Code In A Legitimate Linux Package – Part 2Lecture13.905 min
-
Backdooring a Legitimate Android AppLecture13.1012 min
-
-
Delivery Methods 17
-
IntroductionLecture14.1
-
Mail Deliver – Setting up an SMTP ServerLecture14.206 min
-
Mail Delivery – Spoofing EmailsLecture14.307 min
-
Mail Delivery – Spoofing Email NameLecture14.406 min
-
Mail Delivery – Spoofing Emails (method 2)Lecture14.510 min
-
Hacking OS X & Linux Using Pure Social Engineering Without Sending Any FilesLecture14.610 min
-
Creating A Replica Of Any Website / Login PageLecture14.706 min
-
Stealing Login Info Using Fake A Login PageLecture14.8
-
BeEF Overview & Basic Hook MethodLecture14.907 min
-
Injecting BeEF’s Hook In Any WebpageLecture14.1005 min
-
URL ManipulationLecture14.1110 min
-
Luring Target Into Accessing Evil URL Without Direct InteractionLecture14.1211 min
-
Basic BeEF CommandsLecture14.1304 min
-
Stealing Credentials/Passwords Using A Fake Login PromptLecture14.1402 min
-
Hacking Windows 10 Using A Fake UpdateLecture14.1505 min
-
Hacking Mac OS X Using A Fake UpdateLecture14.1604 min
-
Hacking Linux Using A Fake UpdateLecture14.1705 min
-
-
Using The Above Attacks Outside The Local Network 4
-
Overview of the SetupLecture15.106 min
-
Ex1 – Generating a Backdoor That Works Outside The NetworkLecture15.205 min
-
Configuring The Router To Forward Connections To KaliLecture15.307 min
-
Ex2 – Using BeEF Outside The NetworkLecture15.406 min
-
-
Post Exploitation 2
-
IntroductionLecture16.102 min
-
Upgrading Basic Shell Access To A Meterpreter/Empire AccessLecture16.209 min
-
-
Post Exploitation - Meterpreter 8
-
Meterpreter BasicsLecture17.106 min
-
File System CommandsLecture17.205 min
-
Maintaining Access (Persistence)Lecture17.308 min
-
Spying – Capturing Key Strikes & Taking Screen ShotsLecture17.403 min
-
Pivoting – Theory (What is Pivoting?)Lecture17.507 min
-
Pivoting – Exploiting Devices on The Same Network As The Hacked ComputerLecture17.608 min
-
Controlling Android Phone & Accessing Mic, Camera, Messages, File System & MoreLecture17.709 min
-
Maintaining Access On OS XLecture17.810 min
-
-
Post Exploitation - Empire 6
-
Basics Of Empire AgentsLecture18.106 min
-
File System CommandsLecture18.206 min
-
Upload & Execute Shell CommandsLecture18.305 min
-
Injecting a Backdoor Process In System ProcessesLecture18.410 min
-
2 Methods to Escalating Privileges On OS XLecture18.507 min
-
Maintaining Access On OS XLecture18.6
-
-
Security 4
-
Detecting Fake/Spoofed EmailsLecture19.106 min
-
How to Protect Against BeEF & Other Browser ExploitsLecture19.204 min
-
Detecting Trojans ManuallyLecture19.306 min
-
Detecting Trojans Using a SandboxLecture19.403 min
-
-
Bonus Section 1
-
Bonus Lecture – What’s Next?Lecture20.1
-
This content is protected, please login and enroll course to view this content!

