Social Engineering Full Course (110 Lectures)

MachineGun

New member
Devil
Joined
May 20, 2023
Messages
4
Hellcoins
♆119
Udemy - Learning Social Engineering From Scratch
Author (Director): Udemy

Genre: Tutorial

Description:

Social engineering, sometimes referred to as the science and art of hacking the human mind, is becoming increasingly popular due to the rise of social media, email, or other forms of online communication in our lives. In the field of information security, this term is widely used to refer to a number of techniques used by cybercriminals. The latter are aimed at extorting confidential information from victims or inducing victims to commit actions aimed at penetrating the system bypassing the security system.

Duration: 11:54:17

Video quality: PCRec

Translation: One-voice voice-over (Rus)

Video: AVC/H.264, 1280x720, ~3581 Kbps

Audio: AAC, 2 ch, 192 Kbps

Description next:

Learn to hack Windows, Mac OS X, Linux & Android using social engineering.

"Welcome to the complete course on Social Engineering! In this course we will start from the very basics, you do not need to know anything about penetration testing or hacking. We will start with the basics of social engineering and by the end of the course you will be able to hack most popular operating systems systems (Windows, OS X and Linux), learn how to generate various Trojans and install them on the victim's computer using social engineering techniques.

This course focuses on the practical side of hacking, but we won't neglect the theory either. Before we move on to penetration testing, I will show you how to set up a test environment. This will help us safely practice our penetration testing skills on our own machine. The course is divided into 4 main sections:

  1. Collecting Information - In this section, I will teach you how to collect information about the victim. It can be either a company or a website or a person. I will teach you how to collect information that is related to your goal, such as websites, links, companies, list of people, email addresses, phone numbers, friends list, social media accounts, etc. I will also teach you how to use this information to create an attack strategy.

  2. Generating Evil Files - In this section, I will teach you how to generate evil files (files that will do what you want on the victim's computer). We will talk about backdoors, keyloggers, etc. You will learn how to generate these files for Windows, OS X and Linux operating systems. And that is not all. You will also learn how to make these files bypass antivirus checks, we will make them behave like a normal image or PDF, you will also learn how to embed these files in Microsoft Office documents.

  3. Delivery Methods - In this section, you will learn social engineering methods that will allow you to deliver Trojans to the victim's computer. You will learn how to create fake websites that look like the real thing, how to send email like it was sent by people you can trust. You will also learn how to use fake login pages and fake updates. With the help of them, you can hack into the victim's system. But that's not all, you'll also learn advanced social engineering techniques that will entice the target to visit a malicious URL, and by clicking on it, the target will be hacked.

  4. After hacking - In this section, you will learn how to interact with the system. You will learn how to access the file system, maintain access, change permissions, monitor the target, use the victim's computer as a starting point for hacking the rest of the computers in the system.

This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:

Contents :

Contents of the first part:

Introduction

What is Social Engineering

Teaser - Hacking an Android smartphone. Gaining access to the camera

Course overview

Preparation - Preparing the working environment

Necessary software

Install Kali Linux 2017 as a virtual machine

Install Windows as a virtual machine

Install Ubuntu as virtual machine

Preparing - Linux Basics

Kali Linux Overview

Basic Linux Terminal Commands

Making Snapshots

Updating Installed Programs

Gathering Information

Introduction to Gathering Information

Gathering Information - Gathering Information about Company Website

Maltego Overview

Finding Information about Domain, Finding Email Address

Finding Information about Hosting, Support Mail, Admin Email


Contents of Part 2:

04 Gathering Information - Gathering Information about Company Website

016 - Looking for links to websites related to the victim

017 - Using the collected information to create an attack strategy

05 Gathering information - Gathering Information about the Person

018 - Looking for links to social networks

019 - Looking for linked Twitter accounts of friends

020 - Looking for E-mail friends of the victim

021 - We analyze the information received, create an attack strategy

06 Wicked Windows Files

022 - Introduction

07 Wicked Windows Files - Generating a Backdoor that Antiviruses can't see

023 - Installing Veil 3.0

024 - Veil Overview, Payload Basics

025 - Generating a Backdoor with Veil 3 that Antiviruses can't see

026 - Waiting for Incoming Connections

027 - Hacking a Windows machine using the generated Backdoor


Contents of the third part:

07 Evil Windows Files - Generating a Backdoor that Antiviruses can't see

028 - Installing The Fat Rat

029 - Generating an invisible backdoor using The Fat Rat

030 - Installing Empire

031 - Creating an Empire Foxner

032 - Create Powershell Stager, Hack Windows 10

033 - Modifying the Backdoor source, bypassing the antivirus

08 Evil Files - Surveillance

034 - What is a Keylogger

035 - Creating a remote Keylogger

036 - Capturing passwords with Keylogger

037 - Extracting passwords basics

038 - Extracting passwords from a local machine


Contents of the fourth part:

08 Evil Files - Surveillance

039 - Extract passwords from a remote machine

09 Evil Files - Improve evil files

040 - Bypass all antiviruses. Modify Hex Values

041 - Download and Execute Payload

042 - Build the Perfect Spying Tool

10 Evil Files - Convert Evil Files to Trojans

043 - We embed evil files in any files, for example, in images, PDF, MP4

044 - Invisibly launch evil files in the background

045 - Change the Trojan icon

046 - Mask the .exe file extension to any other (pdf, png, etc.)

047 - Download and Execute Payload (Payload download and run files). The second way


Contents of the fifth part:

10 Evil Files - Convert evil files to Trojans

048 - Embed evil files in any files, such as images, PDF, MP4. Method Two

049 - Embedding a Backdoor in a Real Microsoft Office Document

050 - Embedding Any Evil Files in a Real Microsoft Office Document

11 Mac OS X Evil Files

051 - Introduction

052 - Hacking Mac OS X with the Meterpreter Backdoor

053 - Hacking Mac OS X using the Empire stager

054 - Converting the backdoor to an executable file

055 - Connecting a normal file to the backdoor

056 - Download and Execute Payload (Payload of downloading and running files)

057 - Changing the icon of the trojan

058 - Hidden launch of trojans

059 - Embedding backdoor to a real Microsoft Office document
Contents of the sixth part:

12 Evil Linux files

060 - Hacking Linux with one command

061 - More advanced backdoors for Linux

062 - Installing a remote kilologger

063 - Recording everything a user types with a remote kilologger

064 - Retrieving saved passwords from local machine

065 - Payload launch and send report

066 - Retrieving saved passwords from a remote machine

067 - Embedding malicious code in a real Linux package - Part 1

068 - Embedding malicious code in a real Linux package - Part 2 069 - Embedding a backdoor

in a real Android application purpose) 070 - Introduction 071 - Preparing malicious files to be sent via URL 072 - Email spoofing - Sending messages from other addresses 073 - Hacking OS X and Linux using pure social engineering 074 - Creating a copy of the authorization page of any site 075 - Stealing credentials from using a fake login page 076 - Getting to know BeEF, the basics

077 - Embed Hook BeEF in web pages

078 - Lure the target, convince them to follow the link

079 - Basic BeEF commands

080 - Steal credentials with a fake authorization request

081 - Hack Windows 10 with a fake update

082 - Hack OS X with a fake update 083 - Hacking Linux

with a fake update outside the home network 15 After hacking 088 - Introduction



089 - Upgrading Basic Shell Access to Meterpreter/Empire

090 - Automatic Run Commands on Reverse Connection Establishment

16 After the Hack - Meterpreter

091 - Meterpreter Basics

092 - Filesystem Commands

093 - Access Support - Basic Methods

094 - Access Support - Use a Secure Stealth Method

095 - Surveillance - Capturing keystrokes - Taking screenshots

096 - Pivoting - Theory. What is Pivoting

097 - Pivoting - We hack devices that are on the same network with us


Contents 9 parts:

16 After hacking - Meterpreter

098 - Manage an Android smartphone - Get access to the microphone, camera, file system, etc.

099 - Access support on Mac OS X

17 After the Hack - Empire

100 - Agent Basics

101 - File System Commands

102 - Shell Commands for Uploading Files to the Victim's Machine

103 - Injecting a Backdoor Process into the System Process

104 - Stealing the Root User's Password. Elevating Permissions in OS X

105 - Maintaining Access on OS X

18 Security

106 - Exposing Fake Emails

107 - How to Protect Against BeEF and Other Browser Exploits

108 - Manually Detect Trojans

109 - Detect Trojans with Sandbox
You must reply before you can see the hidden data contained here.
 

aaskibruxa

New member
Joined
May 25, 2023
Messages
20
Hellcoins
♆30
Udemy - Learning Social Engineering From Scratch
Author (Director): Udemy

Genre: Tutorial

Description:

Social engineering, sometimes referred to as the science and art of hacking the human mind, is becoming increasingly popular due to the rise of social media, email, or other forms of online communication in our lives. In the field of information security, this term is widely used to refer to a number of techniques used by cybercriminals. The latter are aimed at extorting confidential information from victims or inducing victims to commit actions aimed at penetrating the system bypassing the security system.

Duration: 11:54:17

Video quality: PCRec

Translation: One-voice voice-over (Rus)

Video: AVC/H.264, 1280x720, ~3581 Kbps

Audio: AAC, 2 ch, 192 Kbps

Description next:

Learn to hack Windows, Mac OS X, Linux & Android using social engineering.

"Welcome to the complete course on Social Engineering! In this course we will start from the very basics, you do not need to know anything about penetration testing or hacking. We will start with the basics of social engineering and by the end of the course you will be able to hack most popular operating systems systems (Windows, OS X and Linux), learn how to generate various Trojans and install them on the victim's computer using social engineering techniques.

This course focuses on the practical side of hacking, but we won't neglect the theory either. Before we move on to penetration testing, I will show you how to set up a test environment. This will help us safely practice our penetration testing skills on our own machine. The course is divided into 4 main sections:

  1. Collecting Information - In this section, I will teach you how to collect information about the victim. It can be either a company or a website or a person. I will teach you how to collect information that is related to your goal, such as websites, links, companies, list of people, email addresses, phone numbers, friends list, social media accounts, etc. I will also teach you how to use this information to create an attack strategy.

  2. Generating Evil Files - In this section, I will teach you how to generate evil files (files that will do what you want on the victim's computer). We will talk about backdoors, keyloggers, etc. You will learn how to generate these files for Windows, OS X and Linux operating systems. And that is not all. You will also learn how to make these files bypass antivirus checks, we will make them behave like a normal image or PDF, you will also learn how to embed these files in Microsoft Office documents.

  3. Delivery Methods - In this section, you will learn social engineering methods that will allow you to deliver Trojans to the victim's computer. You will learn how to create fake websites that look like the real thing, how to send email like it was sent by people you can trust. You will also learn how to use fake login pages and fake updates. With the help of them, you can hack into the victim's system. But that's not all, you'll also learn advanced social engineering techniques that will entice the target to visit a malicious URL, and by clicking on it, the target will be hacked.

  4. After hacking - In this section, you will learn how to interact with the system. You will learn how to access the file system, maintain access, change permissions, monitor the target, use the victim's computer as a starting point for hacking the rest of the computers in the system.

This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:

Contents :

Contents of the first part:

Introduction

What is Social Engineering

Teaser - Hacking an Android smartphone. Gaining access to the camera

Course overview

Preparation - Preparing the working environment

Necessary software

Install Kali Linux 2017 as a virtual machine

Install Windows as a virtual machine

Install Ubuntu as virtual machine

Preparing - Linux Basics

Kali Linux Overview

Basic Linux Terminal Commands

Making Snapshots

Updating Installed Programs

Gathering Information

Introduction to Gathering Information

Gathering Information - Gathering Information about Company Website

Maltego Overview

Finding Information about Domain, Finding Email Address

Finding Information about Hosting, Support Mail, Admin Email


Contents of Part 2:

04 Gathering Information - Gathering Information about Company Website

016 - Looking for links to websites related to the victim

017 - Using the collected information to create an attack strategy

05 Gathering information - Gathering Information about the Person

018 - Looking for links to social networks

019 - Looking for linked Twitter accounts of friends

020 - Looking for E-mail friends of the victim

021 - We analyze the information received, create an attack strategy

06 Wicked Windows Files

022 - Introduction

07 Wicked Windows Files - Generating a Backdoor that Antiviruses can't see

023 - Installing Veil 3.0

024 - Veil Overview, Payload Basics

025 - Generating a Backdoor with Veil 3 that Antiviruses can't see

026 - Waiting for Incoming Connections

027 - Hacking a Windows machine using the generated Backdoor


Contents of the third part:

07 Evil Windows Files - Generating a Backdoor that Antiviruses can't see

028 - Installing The Fat Rat

029 - Generating an invisible backdoor using The Fat Rat

030 - Installing Empire

031 - Creating an Empire Foxner

032 - Create Powershell Stager, Hack Windows 10

033 - Modifying the Backdoor source, bypassing the antivirus

08 Evil Files - Surveillance

034 - What is a Keylogger

035 - Creating a remote Keylogger

036 - Capturing passwords with Keylogger

037 - Extracting passwords basics

038 - Extracting passwords from a local machine


Contents of the fourth part:

08 Evil Files - Surveillance

039 - Extract passwords from a remote machine

09 Evil Files - Improve evil files

040 - Bypass all antiviruses. Modify Hex Values

041 - Download and Execute Payload

042 - Build the Perfect Spying Tool

10 Evil Files - Convert Evil Files to Trojans

043 - We embed evil files in any files, for example, in images, PDF, MP4

044 - Invisibly launch evil files in the background

045 - Change the Trojan icon

046 - Mask the .exe file extension to any other (pdf, png, etc.)

047 - Download and Execute Payload (Payload download and run files). The second way


Contents of the fifth part:

10 Evil Files - Convert evil files to Trojans

048 - Embed evil files in any files, such as images, PDF, MP4. Method Two

049 - Embedding a Backdoor in a Real Microsoft Office Document

050 - Embedding Any Evil Files in a Real Microsoft Office Document

11 Mac OS X Evil Files

051 - Introduction

052 - Hacking Mac OS X with the Meterpreter Backdoor

053 - Hacking Mac OS X using the Empire stager

054 - Converting the backdoor to an executable file

055 - Connecting a normal file to the backdoor

056 - Download and Execute Payload (Payload of downloading and running files)

057 - Changing the icon of the trojan

058 - Hidden launch of trojans

059 - Embedding backdoor to a real Microsoft Office document
Contents of the sixth part:

12 Evil Linux files

060 - Hacking Linux with one command

061 - More advanced backdoors for Linux

062 - Installing a remote kilologger

063 - Recording everything a user types with a remote kilologger

064 - Retrieving saved passwords from local machine

065 - Payload launch and send report

066 - Retrieving saved passwords from a remote machine

067 - Embedding malicious code in a real Linux package - Part 1

068 - Embedding malicious code in a real Linux package - Part 2 069 - Embedding a backdoor

in a real Android application purpose) 070 - Introduction 071 - Preparing malicious files to be sent via URL 072 - Email spoofing - Sending messages from other addresses 073 - Hacking OS X and Linux using pure social engineering 074 - Creating a copy of the authorization page of any site 075 - Stealing credentials from using a fake login page 076 - Getting to know BeEF, the basics

077 - Embed Hook BeEF in web pages

078 - Lure the target, convince them to follow the link

079 - Basic BeEF commands

080 - Steal credentials with a fake authorization request

081 - Hack Windows 10 with a fake update

082 - Hack OS X with a fake update 083 - Hacking Linux

with a fake update outside the home network 15 After hacking 088 - Introduction



089 - Upgrading Basic Shell Access to Meterpreter/Empire

090 - Automatic Run Commands on Reverse Connection Establishment

16 After the Hack - Meterpreter

091 - Meterpreter Basics

092 - Filesystem Commands

093 - Access Support - Basic Methods

094 - Access Support - Use a Secure Stealth Method

095 - Surveillance - Capturing keystrokes - Taking screenshots

096 - Pivoting - Theory. What is Pivoting

097 - Pivoting - We hack devices that are on the same network with us


Contents 9 parts:

16 After hacking - Meterpreter

098 - Manage an Android smartphone - Get access to the microphone, camera, file system, etc.

099 - Access support on Mac OS X

17 After the Hack - Empire

100 - Agent Basics

101 - File System Commands

102 - Shell Commands for Uploading Files to the Victim's Machine

103 - Injecting a Backdoor Process into the System Process

104 - Stealing the Root User's Password. Elevating Permissions in OS X

105 - Maintaining Access on OS X

18 Security

106 - Exposing Fake Emails

107 - How to Protect Against BeEF and Other Browser Exploits

108 - Manually Detect Trojans

109 - Detect Trojans with Sandbox
[Hidden content]
 

lutti

Member
Joined
Sep 28, 2023
Messages
43
Hellcoins
♆87
  1. kdoors, keyloggers, etc. You will learn how to generate these files for Windows, OS X and Linux operating systems. And that is not all. You will also learn how to make these files bypass antivirus checks, we will make them behave like a normal image or PDF, you will also learn how to embed these files in Microsoft Office documents.

  2. Delivery Methods - In this section, you will learn social engineering methods that will allow you to deliver Trojans to the victim's computer. You will learn how to create fake websites that look like the real thing, how to send email like it was sent by people you can trust. You will also learn how to use fake login pages and fake updates. With the help of them, you can hack into the victim's system. But that's not all, you'll also learn advanced social engineering techniques that will entice the target to visit a malicious URL, and by clicking on it, the target will be hacked.

  3. After hacking - In this section, you will learn how to interact with the system. You will learn how to access the file system, maintain access, change permissions, monitor the target, use the victim's computer as a starting point for hacking the rest of the computers in the system.

This course is for educational purposes only and all attacks are performed on my test machines.
"
The course is taught by:

Contents :

Contents of the first part:

Introduction

What is Social Engineering

Teaser - Hacking an Android smartphone. Gaining access to the camera

Course overview

Preparation - Preparing the working environment

Necessary software

Install Kali Linux 2017 as a virtual machine

Install Windows as a virtual machine

Install Ubuntu as virtual machine

Preparing - Linux Basics

Kali Linux Overview

Basic Linux Terminal Commands

Making Snapshots

Updating Installed Programs

Gathering Information

Introduction to Gathering Information

Gathering Information - Gathering Information about Company Website

Maltego Overview

Finding Information about Domain, Finding Email Address

Finding Information about Hosting, Support Mail, Admin Email


Contents of Part 2:

04 Gathering Information - Gathering Information about Company Website

016 - Looking for links to websites related to the victim
 

blanc

Member
Joined
Jan 11, 2024
Messages
70
Hellcoins
♆86
Udemy - Aprendendo Engenharia Social do Zero
Autor (Diretor): Udemy

Gênero: Tutorial

Descrição:

A engenharia social, por vezes referida como a ciência e a arte de hackear a mente humana, está a tornar-se cada vez mais popular devido ao aumento das redes sociais, do e-mail ou de outras formas de comunicação online nas nossas vidas. No campo da segurança da informação, este termo é amplamente utilizado para se referir a uma série de técnicas utilizadas pelos cibercriminosos. Estes últimos visam extorquir informações confidenciais das vítimas ou induzi-las a cometer ações destinadas a penetrar no sistema contornando o sistema de segurança.

Duração: 11:54:17

Qualidade de vídeo: PCRec

Tradução: Voice-over de uma voz (Rus)

Vídeo: AVC/H.264, 1280x720, ~3581 Kbps

Áudio: AAC, 2 canais, 192 Kbps

Descrição a seguir:

Aprenda a hackear Windows, Mac OS X, Linux e Linux. Android usando engenharia social.

"Bem-vindo ao curso completo de Engenharia Social! Neste curso começaremos do básico, você não precisa saber nada sobre testes de penetração ou hacking. Começaremos com o básico da engenharia social e ao final do curso você será capaz de hackear os sistemas operacionais mais populares (Windows, OS X e Linux), aprender como gerar vários Trojans e instalá-los na vítima. Seu computador usando técnicas de engenharia social.

Este curso enfoca o lado prático do hacking, mas também não negligenciaremos a teoria. Antes de passarmos para os testes de penetração, mostrarei como configurar um ambiente de teste. Isso nos ajudará a praticar com segurança nossas habilidades de teste de penetração em nossa própria máquina. O curso está dividido em 4 seções principais:

  1. Coleta de informações – Nesta seção, ensinarei como coletar informações sobre a vítima. Pode ser uma empresa, um site ou uma pessoa. Vou te ensinar como coletar informações relacionadas ao seu objetivo, como sites, links, empresas, lista de pessoas, endereços de e-mail, números de telefone, lista de amigos, contas de redes sociais, etc. esta informação para criar uma estratégia de ataque.

  2. Gerando Arquivos Malignos - Nesta seção, ensinarei como gerar arquivos malignos (arquivos que farão o que você quiser no computador da vítima). Falaremos sobre backdoors, keyloggers, etc. Você aprenderá como gerar esses arquivos para os sistemas operacionais Windows, OS X e Linux. E isso não é tudo. Você também aprenderá como fazer com que esses arquivos ignorem as verificações de antivírus, faremos com que eles se comportem como uma imagem normal ou PDF, você também aprenderá como incorporar esses arquivos em documentos do Microsoft Office.

  3. Métodos de entrega - Nesta seção, você aprenderá métodos de engenharia social que permitirão entregar Trojans ao computador da vítima. Você aprenderá como criar sites falsos que parecem reais, como enviar e-mails como se tivessem sido enviados por pessoas em quem você pode confiar. Você também aprenderá como usar páginas de login e atualizações falsas. Com a ajuda deles, você pode invadir o sistema da vítima. Mas isso não é tudo, você também aprenderá técnicas avançadas de engenharia social que induzirão o alvo a visitar um URL malicioso e, ao clicar nele, o alvo será hackeado.

  4. Após hackear – Nesta seção, você aprenderá como interagir com o sistema. Você aprenderá como acessar o sistema de arquivos, manter o acesso, alterar permissões, monitorar o alvo, usar o computador da vítima como ponto de partida para hackear o restante dos computadores do sistema.

Este curso é apenas para fins educacionais e todos os ataques são realizados em minhas máquinas de teste.
"
O curso é ministrado por:

Conteúdo :

Conteúdo da primeira parte:

Introdução

O que é Engenharia Social

Teaser - Hackeando um smartphone Android. Obtendo acesso à câmera

Visão geral do curso

Preparação - Preparando o ambiente de trabalho

Software necessário

Instale Kali Linux 2017 como uma máquina virtual

Instale o Windows como uma máquina virtual

Instale o Ubuntu como máquina virtual

Preparando - Noções Básicas de Linux

Visão geral do Kali Linux

Comandos básicos do terminal Linux

Fazendo instantâneos

Atualizando programas instalados

Juntando informações

Introdução à coleta de informações

Coleta de informações - Coleta de informações sobre o site da empresa

Visão geral do Maltego

Encontrando informações sobre o domínio, encontrando endereço de e-mail

Encontrando informações sobre hospedagem, e-mail de suporte, e-mail de administrador


Conteúdo da Parte 2:

04 Coleta de informações - Coleta de informações sobre o site da empresa

016 - Procurando links para sites relacionados à vítima

017 - Utilizando as informações coletadas para criar uma estratégia de ataque

05 Coleta de informações - Coleta de informações sobre a pessoa

018 - Procurando links para redes sociais

019 - Procurando contas vinculadas de amigos no Twitter

020 - Procurando E-mail de amigos da vítima

021 – Analisamos as informações recebidas, criamos uma estratégia de ataque

06 Arquivos Perversos do Windows

022 - Introdução

07 Wicked Windows Files – Gerando um backdoor que os antivírus não conseguem ver

023 - Instalando o Véu 3.0

024 - Visão Geral do Véu, Noções Básicas de Carga Útil

025 - Gerando um Backdoor com Veil 3 que os antivírus não conseguem ver

026 - Aguardando conexões de entrada

027 – Hackeando uma máquina Windows usando o Backdoor gerado


Conteúdo da terceira parte:

07 Arquivos malignos do Windows – Gerando um backdoor que os antivírus não conseguem ver

028 - Instalando O Rato Gordo

029 - Gerando um backdoor invisível usando The Fat Rat

030 - Instalando o Império

031 - Criando um Império Foxner

032 - Criar Powershell Stager, hackear o Windows 10

033 – Modificando a fonte do Backdoor, contornando o antivírus

08 Arquivos Malignos – Vigilância

034 - O que é um Keylogger

035 - Criando um Keylogger remoto

036 - Capturando senhas com Keylogger

037 - Noções básicas de extração de senhas

038 – Extraindo senhas de uma máquina local


Conteúdo da quarta parte:

08 Arquivos Malignos – Vigilância

039 – Extraia senhas de uma máquina remota

09 Evil Files – Melhore os arquivos malignos

040 - Ignore todos os antivírus. Modificar valores hexadecimais

041 - Baixar e executar carga útil

042 – Construa a Ferramenta de Espionagem Perfeita

10 arquivos malignos - converta arquivos malignos em cavalos de Tróia

043 - Incorporamos arquivos malignos em qualquer arquivo, por exemplo, em imagens, PDF, MP4

044 - Invisivelmente lança arquivos malignos em segundo plano

045 - Alterar o ícone do Trojan

046 - Mascarar a extensão do arquivo .exe para qualquer outro (pdf, png, etc.)

047 - Baixar e executar carga útil (baixar carga útil e executar arquivos). A segunda maneira


Conteúdo da quinta parte:

10 arquivos malignos – Converta arquivos malignos em cavalos de Tróia

048 - Incorpore arquivos malignos em qualquer arquivo, como imagens, PDF, MP4. Método dois

049 - Incorporando um backdoor em um documento real do Microsoft Office

050 - Incorporando qualquer arquivo malicioso em um documento real do Microsoft Office

11 arquivos malignos do Mac OS X

051 - Introdução

052 - Hackeando o Mac OS X com o Meterpreter Backdoor

053 - Hackeando o Mac OS X usando o Empire Stager

054 - Convertendo o backdoor em um arquivo executável

055 - Conectando um arquivo normal ao backdoor

056 - Download and Execute Payload (Carga útil de download e execução de arquivos)

057 – Alterando o ícone do trojan

058 - Lançamento oculto de trojans

059 - Incorporando backdoor em um documento real do Microsoft Office
Conteúdo da sexta parte:

12 arquivos malignos do Linux

060 – Hackeando Linux com um comando

061 – Backdoors mais avançados para Linux

062 - Instalando um kilologger remoto

063 - Gravando tudo o que um usuário digita com um kilologger remoto

064 – Recuperando senhas salvas da máquina local

065 - Lançamento de carga útil e envio de relatório

066 – Recuperando senhas salvas de uma máquina remota

067 - Incorporando código malicioso em um pacote Linux real - Parte 1

068 - Incorporação de código malicioso em um pacote Linux real - Parte 2 069 - Incorporação de um backdoor

em uma aplicação Android real) 070 - Introdução 071 - Preparando arquivos maliciosos para serem enviados via URL 072 - Falsificação de e-mail - Envio de mensagens de outros endereços 073 - Hackeando OS X e Linux usando pura engenharia social 074 - Criando uma cópia da página de autorização de qualquer site 075 - Roubar credenciais usando uma página de login falsa 076 - Conhecendo o BeEF, o básico

077 - Incorporar Hook BeEF em páginas da web

078 - Atraia o alvo, convença-o a seguir o link

079 - Comandos básicos do BeEF

080 – Roubar credenciais com uma solicitação de autorização falsa

081 – Hackeie o Windows 10 com uma atualização falsa

082 - Hackear o OS X com uma atualização falsa 083 - Hackear o Linux

com uma atualização falsa fora da rede doméstica 15 Após hackear 088 - Introdução



089 - Atualizando o acesso básico do Shell ao Meterpreter/Empire

090 - Comandos de Acionamento Automático no Estabelecimento de Conexão Reversa

16 Depois do Hack - Meterpreter

091 - Noções básicas do medidor

092 - Comandos do sistema de arquivos

093 - Suporte de Acesso - Métodos Básicos

094 - Suporte de acesso - Use um método furtivo seguro

095 - Vigilância - Capturando teclas digitadas - Fazendo capturas de tela

096 - Pivotagem - Teoria. O que é pivotar

097 – Pivoting – Hackeamos dispositivos que estão na mesma rede que nós


Conteúdo 9 partes:

16 Depois de hackear - Meterpreter

098 - Gerenciar um smartphone Android - Tenha acesso ao microfone, câmera, sistema de arquivos, etc.

099 - Suporte de acesso no Mac OS X

17 Depois do Hack - Império

100 - Noções básicas do agente

101 - Comandos do Sistema de Arquivos

102 - Comandos Shell para upload de arquivos para a máquina da vítima

103 - Injetando um processo backdoor no processo do sistema

104 - Roubando a senha do usuário root. Elevando permissões no OS X

105 - Mantendo o acesso no OS X

18 Segurança

106 – Expondo Emails Falsos

107 - Como se proteger contra BeEF e outras explorações de navegador

108 - Detectar Trojans Manualmente

109 – Detecte Trojans com Sandbox
[Conteúdo oculto]
Emoow
 
Top