- Introduction 3
- Teaser – Hacking An Android Phone & Accessing The CameraLecture1.1
 - Introduction to Social EngineeringLecture1.203 min
 - Course OverviewLecture1.304 min
 
 - Preparation - Creating a Penetration Testing Lab 5
- Lab Overview & Needed SoftwareLecture2.106 min
 - Initial PreparationLecture2.209 min
 - Installing Kali Linux as a VM on WindowsLecture2.309 min
 - Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Lecture2.409 min
 - Installing Kali Linux as a VM on LinuxLecture2.511 min
 
 - Preparation - Linux Basics 3
- Kali Linux BasicsLecture3.105 min
 - The Linux Terminal & Basic Linux CommandsLecture3.210 min
 - More Powerful Linux Terminals with AI FeaturesLecture3.305 min
 
 - Information Gathering 1
- IntroductionLecture4.1
 
 - Information Gathering - Gathering Info About A Company/Website 5
- Maltego OverviewLecture5.107 min
 - Discovering Domain Info & Emails Associated With TargetLecture5.207 min
 - Discovering Information About Hosting Company, Support Team Emails & Admin EmailLecture5.307 min
 - Discovering Files, Links, Websites & Other Companies Related To TargetLecture5.405 min
 - Using The Gathered Info To Build An Attack StrategyLecture5.5
 
 - Information Gathering - Gathering Info About A Person 4
- Discovering Websites, Links & Social Networking AccountsLecture6.109 min
 - Discovering Twitter Friends & Associated AccountsLecture6.205 min
 - Discovering Emails Of The Target’s FriendsLecture6.305 min
 - Analysing The Gathered Info & Building An Attack StrategyLecture6.409 min
 
 - Windows Malware 3
- Introduction to Windows MalwareLecture7.1
 - Installing Windows as a Virtual MachineLecture7.206 min
 - Installing Windows as a Virtual Machine on Apple Silicon ComputersLecture7.305 min
 
 - Windows Malware - Generating Undetectable Backdoors 9
- Backdoors and Payloads BasicsLecture8.112 min
 - Creating Your Own BackdoorLecture8.208 min
 - Listening for Backdoor ConnectionsLecture8.304 min
 - Hacking Windows 11 Using Your Own BackdoorLecture8.406 min
 - Introduction to The Fat RatLecture8.506 min
 - Generating An Undetectable Backdoor for Windows – Method 2Lecture8.611 min
 - Introduction to EmpireLecture8.708 min
 - Creating a Windows Powershell Stager & Hacking Windows 10Lecture8.808 min
 - Modifying Backdoor Source To Bypass All Anti-virus ProgramsLecture8.908 min
 
 - Windows Malware - Spying 6
- Introduction to KeyloggersLecture9.106 min
 - Creating A Remote KeyloggerLecture9.209 min
 - Using A Remote Keylogger To Capture Key Strikes Including PasswordsLecture9.308 min
 - Password Recovery BasicsLecture9.407 min
 - Recovering Saved Passwords From Local MachineLecture9.503 min
 - Recovering Saved Passwords From A Remote MachineLecture9.6
 
 - Windows Malware - Enhancing Malware 3
- Bypassing All Anti-Virus Programs By Modifying Hex ValesLecture10.110 min
 - Download & Execute PayloadLecture10.206 min
 - Creating The Perfect Spying ToolLecture10.3
 
 - Windows Malware - Creating Trojans 8
- Embedding Malware With Any File Type Like An Image Or PDFLecture11.110 min
 - Running Malware Silently In The BackgroundLecture11.208 min
 - Changing Trojan’s IconLecture11.308 min
 - Spoofing File Extension From .exe to Anything Else (pdf, png ..etc)Lecture11.411 min
 - Download & Execute Payload (Method 2)Lecture11.506 min
 - Embedding Malware With Any File Type Like An Image Or PDF (Method 2)Lecture11.607 min
 - Embedding a Backdoor In Microsoft Office DocumentLecture11.709 min
 - Embedding Any Malware in a Microsoft Office DocumentLecture11.810 min
 
 - Mac OS X Malware 8
- IntroductionLecture12.103 min
 - Hacking Mac OS X Using A Meterpreter BackdoorLecture12.212 min
 - Hacking Mac OS X Using An Empire StagerLecture12.307 min
 - Converting Basic Backdoor To An ExecutableLecture12.404 min
 - Embedding A Normal File With BackdoorLecture12.509 min
 - Generating a Basic Trojan For Mac OS XLecture12.607 min
 - Changing Trojan’s IconLecture12.706 min
 - Configuring The Trojan To Run SilentlyLecture12.806 min
 
 - Linux Malware 10
- Installing Ubuntu As a Virtual MachineLecture13.106 min
 - Hacking Into Linux-Like Systems Using One CommandLecture13.209 min
 - More Advanced Linux BackdoorLecture13.307 min
 - Using A Remote Keylogger To Capture Key Strikes Including PasswordsLecture13.4
 - Recovering Saved Passwords From A Local MachineLecture13.507 min
 - Execute & Report PayloadLecture13.607 min
 - Recovering Saved Passwords From A Remote MachineLecture13.707 min
 - Embedding Evil Code In A Legitimate Linux Package – Part 1Lecture13.813 min
 - Embedding Evil Code In A Legitimate Linux Package – Part 2Lecture13.905 min
 - Backdooring a Legitimate Android AppLecture13.1012 min
 
 - Delivery Methods 17
- IntroductionLecture14.1
 - Mail Deliver – Setting up an SMTP ServerLecture14.206 min
 - Mail Delivery – Spoofing EmailsLecture14.307 min
 - Mail Delivery – Spoofing Email NameLecture14.406 min
 - Mail Delivery – Spoofing Emails (method 2)Lecture14.510 min
 - Hacking OS X & Linux Using Pure Social Engineering Without Sending Any FilesLecture14.610 min
 - Creating A Replica Of Any Website / Login PageLecture14.706 min
 - Stealing Login Info Using Fake A Login PageLecture14.8
 - BeEF Overview & Basic Hook MethodLecture14.907 min
 - Injecting BeEF’s Hook In Any WebpageLecture14.1005 min
 - URL ManipulationLecture14.1110 min
 - Luring Target Into Accessing Evil URL Without Direct InteractionLecture14.1211 min
 - Basic BeEF CommandsLecture14.1304 min
 - Stealing Credentials/Passwords Using A Fake Login PromptLecture14.1402 min
 - Hacking Windows 10 Using A Fake UpdateLecture14.1505 min
 - Hacking Mac OS X Using A Fake UpdateLecture14.1604 min
 - Hacking Linux Using A Fake UpdateLecture14.1705 min
 
 - Using The Above Attacks Outside The Local Network 4
- Overview of the SetupLecture15.106 min
 - Ex1 – Generating a Backdoor That Works Outside The NetworkLecture15.205 min
 - Configuring The Router To Forward Connections To KaliLecture15.307 min
 - Ex2 – Using BeEF Outside The NetworkLecture15.406 min
 
 - Post Exploitation 2
- IntroductionLecture16.102 min
 - Upgrading Basic Shell Access To A Meterpreter/Empire AccessLecture16.209 min
 
 - Post Exploitation - Meterpreter 8
- Meterpreter BasicsLecture17.106 min
 - File System CommandsLecture17.205 min
 - Maintaining Access (Persistence)Lecture17.308 min
 - Spying – Capturing Key Strikes & Taking Screen ShotsLecture17.403 min
 - Pivoting – Theory (What is Pivoting?)Lecture17.507 min
 - Pivoting – Exploiting Devices on The Same Network As The Hacked ComputerLecture17.608 min
 - Controlling Android Phone & Accessing Mic, Camera, Messages, File System & MoreLecture17.709 min
 - Maintaining Access On OS XLecture17.810 min
 
 - Post Exploitation - Empire 6
- Basics Of Empire AgentsLecture18.106 min
 - File System CommandsLecture18.206 min
 - Upload & Execute Shell CommandsLecture18.305 min
 - Injecting a Backdoor Process In System ProcessesLecture18.410 min
 - 2 Methods to Escalating Privileges On OS XLecture18.507 min
 - Maintaining Access On OS XLecture18.6
 
 - Security 4
- Detecting Fake/Spoofed EmailsLecture19.106 min
 - How to Protect Against BeEF & Other Browser ExploitsLecture19.204 min
 - Detecting Trojans ManuallyLecture19.306 min
 - Detecting Trojans Using a SandboxLecture19.403 min
 
 - Bonus Section 1
- Bonus Lecture – What’s Next?Lecture20.1
 
 
This content is protected, please login and enroll course to view this content!
