- Introduction 3
- Lecture1.1
- Lecture1.203 min
- Lecture1.304 min
- Preparation - Creating a Penetration Testing Lab 6
- Lecture2.106 min
- Lecture2.209 min
- Lecture2.309 min
- Lecture2.410 min
- Lecture2.509 min
- Lecture2.611 min
- Preparation - Linux Basics 3
- Lecture3.105 min
- Lecture3.213 min
- Lecture3.305 min
- Information Gathering 1
- Lecture4.1
- Information Gathering - Gathering Info About A Company/Website 5
- Lecture5.107 min
- Lecture5.207 min
- Lecture5.307 min
- Lecture5.405 min
- Lecture5.5
- Information Gathering - Gathering Info About A Person 4
- Lecture6.109 min
- Lecture6.205 min
- Lecture6.304 min
- Lecture6.409 min
- Windows Malware 2
- Lecture7.1
- Lecture7.206 min
- Windows Malware - Generating Undetectable Backdoors 10
- Lecture8.104 min
- Lecture8.207 min
- Lecture8.310 min
- Lecture8.407 min
- Lecture8.507 min
- Lecture8.606 min
- Lecture8.711 min
- Lecture8.808 min
- Lecture8.908 min
- Lecture8.1008 min
- Windows Malware - Spying 6
- Lecture9.106 min
- Lecture9.209 min
- Lecture9.307 min
- Lecture9.407 min
- Lecture9.503 min
- Lecture9.6
- Windows Malware - Enhancing Malware 2
- Lecture10.110 min
- Lecture10.2
- Windows Malware - Creating Trojans 9
- Lecture11.106 min
- Lecture11.210 min
- Lecture11.308 min
- Lecture11.408 min
- Lecture11.511 min
- Lecture11.606 min
- Lecture11.707 min
- Lecture11.809 min
- Lecture11.910 min
- Mac OS X Malware 9
- Lecture12.103 min
- Lecture12.212 min
- Lecture12.306 min
- Lecture12.403 min
- Lecture12.509 min
- Lecture12.607 min
- Lecture12.706 min
- Lecture12.806 min
- Lecture12.9
- Linux Malware 10
- Lecture13.106 min
- Lecture13.209 min
- Lecture13.306 min
- Lecture13.4
- Lecture13.507 min
- Lecture13.607 min
- Lecture13.707 min
- Lecture13.812 min
- Lecture13.905 min
- Lecture13.1012 min
- Delivery Methods 16
- Lecture14.1
- Lecture14.207 min
- Lecture14.312 min
- Lecture14.410 min
- Lecture14.510 min
- Lecture14.606 min
- Lecture14.7
- Lecture14.807 min
- Lecture14.905 min
- Lecture14.1010 min
- Lecture14.1111 min
- Lecture14.1204 min
- Lecture14.1302 min
- Lecture14.1405 min
- Lecture14.1504 min
- Lecture14.1605 min
- Using The Above Attacks Outside The Local Network 4
- Lecture15.107 min
- Lecture15.205 min
- Lecture15.307 min
- Lecture15.406 min
- Post Exploitation 2
- Lecture16.102 min
- Lecture16.209 min
- Post Exploitation - Meterpreter 9
- Lecture17.106 min
- Lecture17.205 min
- Lecture17.305 min
- Lecture17.407 min
- Lecture17.503 min
- Lecture17.607 min
- Lecture17.708 min
- Lecture17.809 min
- Lecture17.910 min
- Post Exploitation - Empire 6
- Lecture18.106 min
- Lecture18.206 min
- Lecture18.304 min
- Lecture18.409 min
- Lecture18.507 min
- Lecture18.6
- Security 4
- Lecture19.106 min
- Lecture19.204 min
- Lecture19.305 min
- Lecture19.403 min
- Bonus Section 1
- Lecture20.1
Recovering Saved Passwords From A Remote Machine
In this lecture you will learn how to package LaZagne as an evil file so that when executed on a computer, it recovers all saved passwords and send them to use by email.
Resources: