What you'll learn
- Hack updated & patched systems (Windows, Linux, Apple Mac OS and Android).
- Generate undetectable backdoors for Windows, Apple Mac OS, Linux & Android.
- Steal passwords from Windows & Linux.
- Hack with Microsoft Office documents.
- Backdoor Android applications.
- Make evil files (backdoors / keyloggers) look and function like normal files (image, pdf or any other file type).
- Manually modify malware to bypass anti-virus programs.
- Advanced malware delivery techniques (fake pages, fake emails, indirect notifications, etc)
- Advanced post exploitation.
- Discover websites, companies, people, emails and social networking accounts associated with a person or a company.
- Install hacking lab & needed software (on Windows, Apple Mac OS and Linux)
- Install Kali Linux - a penetration testing operating system
- Install windows & vulnerable operating systems as virtual machines for testing
- Linux basics
- Linux commands and how to interact with the terminal
- Build attack strategies based on the gathered info
- Generate a remote keylogger that logs every key strike entered on a target computer and sends reports by email.
- Backdoor Debian packages for Linux
- Generate Apple Mac OS backdoors that look and function like normal files (image, pdf ..etc).
- Hack Apple Mac OS and Linux computers by using a simple one line command.
- Send emails from ANY email account.
- Create fake websites that look exactly like any other website.
- Create a fake login page and use it to steal passwords.
- Use smart social engineering techniques to make the target person willingly use our fake website.
- Deliver malware as fake updates, fake installers ..etc.
- Read, write download, upload and execute files on compromised systems.
- Capture key strikes on compromised systems.
- Use a compromised computer as a pivot to hack other computers on the same network.
- Maintain your access to the hacked systems even after restart.
- Escalate your privileges to admin.
- Analyse files & detect undetectable malware.
- Use a sandbox to analyse undetectable malware.
- Access messages, social accounts, camera, GPS .....etc of hacked phone.
Watch Online on Mega
Last edited by a moderator: