- Introduction 3
- Teaser – Hacking An Android Phone & Accessing The CameraLecture1.1
- Introduction to Social EngineeringLecture1.203 min
- Course OverviewLecture1.304 min
- Preparation - Creating a Penetration Testing Lab 5
- Lab Overview & Needed SoftwareLecture2.106 min
- Initial PreparationLecture2.209 min
- Installing Kali Linux as a VM on WindowsLecture2.309 min
- Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
- Installing Kali Linux as a VM on LinuxLecture2.511 min
- Preparation - Linux Basics 3
- Kali Linux BasicsLecture3.105 min
- The Linux Terminal & Basic Linux CommandsLecture3.210 min
- More Powerful Linux Terminals with AI FeaturesLecture3.305 min
- Information Gathering 1
- IntroductionLecture4.1
- Information Gathering - Gathering Info About A Company/Website 5
- Maltego OverviewLecture5.107 min
- Discovering Domain Info & Emails Associated With TargetLecture5.207 min
- Discovering Information About Hosting Company, Support Team Emails & Admin EmailLecture5.307 min
- Discovering Files, Links, Websites & Other Companies Related To TargetLecture5.405 min
- Using The Gathered Info To Build An Attack StrategyLecture5.5
- Information Gathering - Gathering Info About A Person 4
- Discovering Websites, Links & Social Networking AccountsLecture6.109 min
- Discovering Twitter Friends & Associated AccountsLecture6.205 min
- Discovering Emails Of The Target’s FriendsLecture6.305 min
- Analysing The Gathered Info & Building An Attack StrategyLecture6.409 min
- Windows Malware 3
- Introduction to Windows MalwareLecture7.1
- Installing Windows as a Virtual MachineLecture7.206 min
- Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture7.305 min
- Windows Malware - Generating Undetectable Backdoors 9
- Backdoors and Payloads BasicsLecture8.112 min
- Creating Your Own BackdoorLecture8.208 min
- Listening for Backdoor ConnectionsLecture8.304 min
- Hacking Windows 11 Using Your Own BackdoorLecture8.406 min
- Introduction to The Fat RatLecture8.506 min
- Generating An Undetectable Backdoor for Windows – Method 2Lecture8.611 min
- Introduction to EmpireLecture8.708 min
- Creating a Windows Powershell Stager & Hacking Windows 10Lecture8.808 min
- Modifying Backdoor Source To Bypass All Anti-virus ProgramsLecture8.908 min
- Windows Malware - Spying 6
- Introduction to KeyloggersLecture9.106 min
- Creating A Remote KeyloggerLecture9.209 min
- Using A Remote Keylogger To Capture Key Strikes Including PasswordsLecture9.308 min
- Password Recovery BasicsLecture9.407 min
- Recovering Saved Passwords From Local MachineLecture9.503 min
- Recovering Saved Passwords From A Remote MachineLecture9.6
- Windows Malware - Enhancing Malware 3
- Bypassing All Anti-Virus Programs By Modifying Hex ValesLecture10.110 min
- Download & Execute PayloadLecture10.206 min
- Creating The Perfect Spying ToolLecture10.3
- Windows Malware - Creating Trojans 8
- Embedding Malware With Any File Type Like An Image Or PDFLecture11.110 min
- Running Malware Silently In The BackgroundLecture11.208 min
- Changing Trojan’s IconLecture11.308 min
- Spoofing File Extension From .exe to Anything Else (pdf, png ..etc)Lecture11.411 min
- Download & Execute Payload (Method 2)Lecture11.506 min
- Embedding Malware With Any File Type Like An Image Or PDF (Method 2)Lecture11.607 min
- Embedding a Backdoor In Microsoft Office DocumentLecture11.709 min
- Embedding Any Malware in a Microsoft Office DocumentLecture11.810 min
- Mac OS X Malware 8
- IntroductionLecture12.103 min
- Hacking Mac OS X Using A Meterpreter BackdoorLecture12.212 min
- Hacking Mac OS X Using An Empire StagerLecture12.307 min
- Converting Basic Backdoor To An ExecutableLecture12.404 min
- Embedding A Normal File With BackdoorLecture12.509 min
- Generating a Basic Trojan For Mac OS XLecture12.607 min
- Changing Trojan’s IconLecture12.706 min
- Configuring The Trojan To Run SilentlyLecture12.806 min
- Linux Malware 10
- Installing Ubuntu As a Virtual MachineLecture13.106 min
- Hacking Into Linux-Like Systems Using One CommandLecture13.209 min
- More Advanced Linux BackdoorLecture13.307 min
- Using A Remote Keylogger To Capture Key Strikes Including PasswordsLecture13.4
- Recovering Saved Passwords From A Local MachineLecture13.507 min
- Execute & Report PayloadLecture13.607 min
- Recovering Saved Passwords From A Remote MachineLecture13.707 min
- Embedding Evil Code In A Legitimate Linux Package – Part 1Lecture13.813 min
- Embedding Evil Code In A Legitimate Linux Package – Part 2Lecture13.905 min
- Backdooring a Legitimate Android AppLecture13.1012 min
- Delivery Methods 17
- IntroductionLecture14.1
- Mail Deliver – Setting up an SMTP ServerLecture14.206 min
- Mail Delivery – Spoofing EmailsLecture14.307 min
- Mail Delivery – Spoofing Email NameLecture14.406 min
- Mail Delivery – Spoofing Emails (method 2)Lecture14.510 min
- Hacking OS X & Linux Using Pure Social Engineering Without Sending Any FilesLecture14.610 min
- Creating A Replica Of Any Website / Login PageLecture14.706 min
- Stealing Login Info Using Fake A Login PageLecture14.8
- BeEF Overview & Basic Hook MethodLecture14.907 min
- Injecting BeEF’s Hook In Any WebpageLecture14.1005 min
- URL ManipulationLecture14.1110 min
- Luring Target Into Accessing Evil URL Without Direct InteractionLecture14.1211 min
- Basic BeEF CommandsLecture14.1304 min
- Stealing Credentials/Passwords Using A Fake Login PromptLecture14.1402 min
- Hacking Windows 10 Using A Fake UpdateLecture14.1505 min
- Hacking Mac OS X Using A Fake UpdateLecture14.1604 min
- Hacking Linux Using A Fake UpdateLecture14.1705 min
- Using The Above Attacks Outside The Local Network 4
- Overview of the SetupLecture15.106 min
- Ex1 – Generating a Backdoor That Works Outside The NetworkLecture15.205 min
- Configuring The Router To Forward Connections To KaliLecture15.307 min
- Ex2 – Using BeEF Outside The NetworkLecture15.406 min
- Post Exploitation 2
- IntroductionLecture16.102 min
- Upgrading Basic Shell Access To A Meterpreter/Empire AccessLecture16.209 min
- Post Exploitation - Meterpreter 8
- Meterpreter BasicsLecture17.106 min
- File System CommandsLecture17.205 min
- Maintaining Access (Persistence)Lecture17.308 min
- Spying – Capturing Key Strikes & Taking Screen ShotsLecture17.403 min
- Pivoting – Theory (What is Pivoting?)Lecture17.507 min
- Pivoting – Exploiting Devices on The Same Network As The Hacked ComputerLecture17.608 min
- Controlling Android Phone & Accessing Mic, Camera, Messages, File System & MoreLecture17.709 min
- Maintaining Access On OS XLecture17.810 min
- Post Exploitation - Empire 6
- Basics Of Empire AgentsLecture18.106 min
- File System CommandsLecture18.206 min
- Upload & Execute Shell CommandsLecture18.305 min
- Injecting a Backdoor Process In System ProcessesLecture18.410 min
- 2 Methods to Escalating Privileges On OS XLecture18.507 min
- Maintaining Access On OS XLecture18.6
- Security 4
- Detecting Fake/Spoofed EmailsLecture19.106 min
- How to Protect Against BeEF & Other Browser ExploitsLecture19.204 min
- Detecting Trojans ManuallyLecture19.306 min
- Detecting Trojans Using a SandboxLecture19.403 min
- Bonus Section 1
- Bonus Lecture – What’s Next?Lecture20.1
Introduction to Windows Malware
This lecture will give you an overview of the structure of this section and what you’ll learn in it.
