• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

    • Courses
    • Ethical Hacking
    • Learn Social Engineering From Scratch
      • Introduction 3

        • Lecture1.1
          Teaser – Hacking An Android Phone & Accessing The Camera
          05 min
        • Lecture1.2
          Introduction to Social Engineering
          03 min
        • Lecture1.3
          Course Overview
          04 min
      • Preparation - Creating a Penetration Testing Lab 6

        • Lecture2.1
          Lab Overview & Needed Software
          06 min
        • Lecture2.2
          Initial Preparation
          09 min
        • Lecture2.3
          Installing Kali Linux as a VM on Windows
          09 min
        • Lecture2.4
          Installing Kali Linux as a VM on Apple Mac OS
          10 min
        • Lecture2.5
          Installing Kali Linux as a VM on M1 Apple Computers
          09 min
        • Lecture2.6
          Installing Kali Linux as a VM on Linux
          11 min
      • Preparation - Linux Basics 3

        • Lecture3.1
          Basic Overview Of Kali Linux
          05 min
        • Lecture3.2
          The Linux Terminal & Basic Linux Commands
          13 min
        • Lecture3.3
          Creating & Using Snapshots
          05 min
      • Information Gathering 1

        • Lecture4.1
          Introduction
          02 min
      • Information Gathering - Gathering Info About A Company/Website 5

        • Lecture5.1
          Maltego Overview
          07 min
        • Lecture5.2
          Discovering Domain Info & Emails Associated With Target
          07 min
        • Lecture5.3
          Discovering Information About Hosting Company, Support Team Emails & Admin Email
          07 min
        • Lecture5.4
          Discovering Files, Links, Websites & Other Companies Related To Target
          05 min
        • Lecture5.5
          Using The Gathered Info To Build An Attack Strategy
          04 min
      • Information Gathering - Gathering Info About A Person 4

        • Lecture6.1
          Discovering Websites, Links & Social Networking Accounts
          09 min
        • Lecture6.2
          Discovering Twitter Friends & Associated Accounts
          05 min
        • Lecture6.3
          Discovering Emails Of The Target’s Friends
          04 min
        • Lecture6.4
          Analysing The Gathered Info & Building An Attack Strategy
          09 min
      • Windows Malware 2

        • Lecture7.1
          Introduction
          02 min
        • Lecture7.2
          Installing Windows as a Virtual Machine
          06 min
      • Windows Malware - Generating Undetectable Backdoors 10

        • Lecture8.1
          Installing Veil Framework
          04 min
        • Lecture8.2
          Veil Overview & Payloads Basics
          07 min
        • Lecture8.3
          Generating An Undetectable Backdoors For Windows
          10 min
        • Lecture8.4
          Listening For Incoming Connections
          07 min
        • Lecture8.5
          Hacking A Windows 10 Machine Using The Generated Backdoor
          07 min
        • Lecture8.6
          Introduction to The Fat Rat
          06 min
        • Lecture8.7
          Generating An Undetectable Backdoor for Windows – Method 2
          11 min
        • Lecture8.8
          Introduction to Empire
          08 min
        • Lecture8.9
          Creating a Windows Powershell Stager & Hacking Windows 10
          08 min
        • Lecture8.10
          Modifying Backdoor Source To Bypass All Anti-virus Programs
          08 min
      • Windows Malware - Spying 6

        • Lecture9.1
          Introduction to Keyloggers
          06 min
        • Lecture9.2
          Creating A Remote Keylogger
          09 min
        • Lecture9.3
          Using A Remote Keylogger To Capture Key Strikes Including Passwords
          07 min
        • Lecture9.4
          Password Recovery Basics
          07 min
        • Lecture9.5
          Recovering Saved Passwords From Local Machine
          03 min
        • Lecture9.6
          Recovering Saved Passwords From A Remote Machine
          12 min
      • Windows Malware - Enhancing Malware 2

        • Lecture10.1
          Bypassing All Anti-Virus Programs By Modifying Hex Vales
          10 min
        • Lecture10.2
          Creating The Perfect Spying Tool
          07 min
      • Windows Malware - Creating Trojans 9

        • Lecture11.1
          Download & Execute Payload
          06 min
        • Lecture11.2
          Embedding Evil Files With Any File Type Like An Image Or PDF
          10 min
        • Lecture11.3
          Running Evil Files Silently In The Background
          08 min
        • Lecture11.4
          Changing Trojan’s Icon
          08 min
        • Lecture11.5
          Spoofing File Extension From .exe to Anything Else (pdf, png ..etc)
          11 min
        • Lecture11.6
          Download & Execute Payload (Method 2)
          06 min
        • Lecture11.7
          Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)
          07 min
        • Lecture11.8
          Embedding backdoor In A Legitimate Microsoft Office Document
          09 min
        • Lecture11.9
          Embedding Any Evil File In A Legitimate Microsoft Office Document
          10 min
      • Mac OS X Malware 9

        • Lecture12.1
          Introduction
          03 min
        • Lecture12.2
          Hacking Mac OS X Using A Meterpreter Backdoor
          12 min
        • Lecture12.3
          Hacking Mac OS X Using An Empire Stager
          06 min
        • Lecture12.4
          Converting Basic Backdoor To An Executable
          03 min
        • Lecture12.5
          Embedding A Normal File With Backdoor
          09 min
        • Lecture12.6
          Generating a Basic Trojan For Max OS X
          07 min
        • Lecture12.7
          Changing Trojan’s Icon
          06 min
        • Lecture12.8
          Configuring The Trojan To Run Silently
          06 min
        • Lecture12.9
          Embedding Backdoor In A Legitimate Microsoft Office Document
          06 min
      • Linux Malware 10

        • Lecture13.1
          Installing Ubuntu As a Virtual Machine
          06 min
        • Lecture13.2
          Hacking Into Linux-Like Systems Using One Command
          09 min
        • Lecture13.3
          More Advanced Linux Backdoor
          06 min
        • Lecture13.4
          Using A Remote Keylogger To Capture Key Strikes Including Passwords
          10 min
        • Lecture13.5
          Recovering Saved Passwords From A Local Machine
          07 min
        • Lecture13.6
          Execute & Report Payload
          07 min
        • Lecture13.7
          Recovering Saved Passwords From A Remote Machine
          07 min
        • Lecture13.8
          Embedding Evil Code In A Legitimate Linux Package – Part 1
          12 min
        • Lecture13.9
          Embedding Evil Code In A Legitimate Linux Package – Part 2
          05 min
        • Lecture13.10
          Backdooring a Legitimate Android App
          12 min
      • Delivery Methods 16

        • Lecture14.1
          Introduction
          02 min
        • Lecture14.2
          Mail Deliver – Setting up an SMTP Server
          07 min
        • Lecture14.3
          Mail Delivery – Spoofing Emails
          12 min
        • Lecture14.4
          Mail Delivery – Spoofing Emails (method 2)
          10 min
        • Lecture14.5
          Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files
          10 min
        • Lecture14.6
          Creating A Replica Of Any Website / Login Page
          06 min
        • Lecture14.7
          Stealing Login Info Using Fake A Login Page
          10 min
        • Lecture14.8
          BeEF Overview & Basic Hook Method
          07 min
        • Lecture14.9
          Injecting BeEF’s Hook In Any Webpage
          05 min
        • Lecture14.10
          URL Manipulation
          10 min
        • Lecture14.11
          Luring Target Into Accessing Evil URL Without Direct Interaction
          11 min
        • Lecture14.12
          Basic BeEF Commands
          04 min
        • Lecture14.13
          Stealing Credentials/Passwords Using A Fake Login Prompt
          02 min
        • Lecture14.14
          Hacking Windows 10 Using A Fake Update
          05 min
        • Lecture14.15
          Hacking Mac OS X Using A Fake Update
          04 min
        • Lecture14.16
          Hacking Linux Using A Fake Update
          05 min
      • Using The Above Attacks Outside The Local Network 4

        • Lecture15.1
          Overview of the Setup
          07 min
        • Lecture15.2
          Ex1 – Generating a Backdoor That Works Outside The Network
          05 min
        • Lecture15.3
          Configuring The Router To Forward Connections To Kali
          07 min
        • Lecture15.4
          Ex2 – Using BeEF Outside The Network
          06 min
      • Post Exploitation 2

        • Lecture16.1
          Introduction
          02 min
        • Lecture16.2
          Upgrading Basic Shell Access To A Meterpreter/Empire Access
          09 min
      • Post Exploitation - Meterpreter 9

        • Lecture17.1
          Meterpreter Basics
          06 min
        • Lecture17.2
          File System Commands
          05 min
        • Lecture17.3
          Maintaining Access Basic Methods
          05 min
        • Lecture17.4
          Maintaining Access – Using a Reliable & undetectable Method
          07 min
        • Lecture17.5
          Spying – Capturing Key Strikes & Taking Screen Shots
          03 min
        • Lecture17.6
          Pivoting – Theory (What is Pivoting?)
          07 min
        • Lecture17.7
          Pivoting – Exploiting Devices on The Same Network As The Hacked Computer
          08 min
        • Lecture17.8
          Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More
          09 min
        • Lecture17.9
          Maintaining Access On OS X
          10 min
      • Post Exploitation - Empire 6

        • Lecture18.1
          Basics Of Empire Agents
          06 min
        • Lecture18.2
          File System Commands
          06 min
        • Lecture18.3
          Upload & Execute Shell Commands
          04 min
        • Lecture18.4
          Injecting Backdoor Process In System Processes
          09 min
        • Lecture18.5
          2 Methods to Escalating Privileges On OS X
          07 min
        • Lecture18.6
          Maintaining Access On OS X
          05 min
      • Security 4

        • Lecture19.1
          Detecting Fake/Spoofed Emails
          06 min
        • Lecture19.2
          How to Protect Against BeEF & Other Browser Exploits
          04 min
        • Lecture19.3
          Detecting Trojans Manually
          05 min
        • Lecture19.4
          Detecting Trojans Using a Sandbox
          03 min
      • Bonus Section 1

        • Lecture20.1
          Bonus Lecture – What’s Next?

      Recovering Saved Passwords From A Remote Machine

      https://zsecurity.org/wp-content/uploads/2017/12/46-weaponising-lazagne.mp4

       

      In this lecture you will learn how to package LaZagne as an evil file so that when executed on a computer, it recovers all saved passwords and send them to use by email.

       

      Resources:

      run-laZagne,txt

      Recovering Saved Passwords From Local Machine
      Prev
      Bypassing All Anti-Virus Programs By Modifying Hex Vales
      Next

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2021 zSecurity Ltd. All rights reserved.

      • Privacy
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Learn more Hacking!

      While waiting for the download, why not follow us on media? We regularly post hacking tutorials and articles


      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance