FileMood

Download [FreeCourseSite.com] Udemy - Learn Social Engineering From Scratch

FreeCourseSite com Udemy Learn Social Engineering From Scratch

Name

[FreeCourseSite.com] Udemy - Learn Social Engineering From Scratch

 DOWNLOAD Copy Link

Total Size

1.7 GB

Total Files

232

Hash

BB6BF22555117E061B5B44F6257F8F182EDDEE6B

/001 What Is Social Engineering/

001 What Is Social Engineering-subtitle-en.srt

4.7 KB

001 What Is Social Engineering.mp4

11.5 MB

002 Teaser - Hacking An Android Phone & Accessing The Camera-subtitle-en.srt

8.1 KB

002 Teaser - Hacking An Android Phone & Accessing The Camera.mp4

16.2 MB

003 Course Overview-subtitle-en.srt

6.3 KB

003 Course Overview.mp4

11.1 MB

/01 Preparation - Creating a Penetration Testing Lab/

004 Lab Overview & Needed Software-subtitle-en.srt

5.2 KB

004 Lab Overview & Needed Software.mp4

7.0 MB

005 Installing Kali E7 As a Virtual Machine Using a Ready Image-subtitle-en.srt

11.9 KB

005 Installing Kali E7 As a Virtual Machine Using a Ready Image.mp4

22.0 MB

006 Installing Windows As a Virtual Machine-subtitle-en.srt

4.7 KB

006 Installing Windows As a Virtual Machine.mp4

9.8 MB

007 Installing Ubuntu As a Virtual Machine-subtitle-en.srt

10.2 KB

007 Installing Ubuntu As a Virtual Machine.mp4

14.2 MB

external_links.txt

0.4 KB

/02 Preparation - Linux Basics/

008 Basic Overview Of Kali Linux-subtitle-en.srt

6.4 KB

008 Basic Overview Of Kali Linux.mp4

15.1 MB

009 The Linux Terminal & Basic Linux Commands-subtitle-en.srt

13.0 KB

009 The Linux Terminal & Basic Linux Commands.mp4

32.4 MB

010 Creating & Using Snapshots-subtitle-en.srt

9.5 KB

010 Creating & Using Snapshots.mp4

16.0 MB

011 Updating Sources & Installing Programs-subtitle-en.srt

7.0 KB

011 Updating Sources & Installing Programs.mp4

18.7 MB

/03 Information Gathering/

012 Introduction-subtitle-en.srt

2.7 KB

012 Introduction.mp4

4.8 MB

/04 Information Gathering - Gathering Info About A Company_Website/

013 Maltego Overview-subtitle-en.srt

12.3 KB

013 Maltego Overview.mp4

17.4 MB

014 Discovering Domain Info & Emails Associated With Target-subtitle-en.srt

10.2 KB

014 Discovering Domain Info & Emails Associated With Target.mp4

13.3 MB

015 Discovering Information About Hosting Company_ Support Team Emails & Admin Email-subtitle-en.srt

8.9 KB

015 Discovering Information About Hosting Company_ Support Team Emails & Admin Email.mp4

14.8 MB

016 Discovering Files_ Links_ Websites & Other Companies Related To Target-subtitle-en.srt

6.3 KB

016 Discovering Files_ Links_ Websites & Other Companies Related To Target.mp4

14.2 MB

017 Using The Gathered Info To Build An Attack Strategy-subtitle-en.srt

6.1 KB

017 Using The Gathered Info To Build An Attack Strategy.mp4

9.5 MB

external_links.txt

0.1 KB

/05 Information Gathering - Gathering Info About A Person/

018 Discovering Websites_ Links & Social Networking Accounts-subtitle-en.srt

14.0 KB

018 Discovering Websites_ Links & Social Networking Accounts.mp4

23.6 MB

019 Discovering Twitter Friends & Associated Accounts-subtitle-en.srt

6.7 KB

019 Discovering Twitter Friends & Associated Accounts.mp4

9.8 MB

020 Discovering Emails Of The Target's Friends-subtitle-en.srt

6.1 KB

020 Discovering Emails Of The Target's Friends.mp4

9.4 MB

021 Analysing The Gathered Info & Building An Attack Strategy-subtitle-en.srt

12.2 KB

021 Analysing The Gathered Info & Building An Attack Strategy.mp4

22.2 MB

/06 Windows Evil Files/

022 Introduction-subtitle-en.srt

2.9 KB

022 Introduction.mp4

5.3 MB

/07 Windows Evil Files - Generating Undetectable Backdoors/

023 Installing Veil 3_0-subtitle-en.srt

10.1 KB

023 Installing Veil 3_0.mp4

16.1 MB

024 Veil Overview & Payloads Basics-subtitle-en.srt

10.6 KB

024 Veil Overview & Payloads Basics.mp4

12.1 MB

025 Generating An Undetectable Backdoor Using Veil 3-subtitle-en.srt

13.2 KB

025 Generating An Undetectable Backdoor Using Veil 3.mp4

21.8 MB

026 Listening For Incoming Connections-subtitle-en.srt

9.8 KB

026 Listening For Incoming Connections.mp4

13.3 MB

027 Hacking A Windows 10 Machine Using The Generated Backdoor-subtitle-en.srt

9.6 KB

027 Hacking A Windows 10 Machine Using The Generated Backdoor.mp4

16.7 MB

028 Installing The Fat Rat-subtitle-en.srt

8.9 KB

028 Installing The Fat Rat.mp4

14.3 MB

029 Generating An Undetectable Backdoor Using TheFatRat-subtitle-en.srt

15.4 KB

029 Generating An Undetectable Backdoor Using TheFatRat.mp4

28.3 MB

030 Installing Empire-subtitle-en.srt

5.8 KB

030 Installing Empire.mp4

13.2 MB

031 Creating An Empire Listener-subtitle-en.srt

7.7 KB

031 Creating An Empire Listener.mp4

12.8 MB

032 Creating a Windows Powershell Stager & Hacking Windows 10-subtitle-en.srt

8.5 KB

032 Creating a Windows Powershell Stager & Hacking Windows 10.mp4

17.0 MB

033 Modifying Backdoor Source To Bypass All Anti-virus Programs-subtitle-en.srt

11.1 KB

033 Modifying Backdoor Source To Bypass All Anti-virus Programs.mp4

14.7 MB

external_links.txt

0.2 KB

/08 Windows Evil Files - Spying/

034 What Is A Keylogger _-subtitle-en.srt

9.1 KB

034 What Is A Keylogger _.mp4

16.4 MB

035 Creating A Remote Keylogger-subtitle-en.srt

6.2 KB

035 Creating A Remote Keylogger.mp4

11.6 MB

036 Using A Remote Keylogger To Capture Key Strikes Including Passwords-subtitle-en.srt

9.9 KB

036 Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4

18.2 MB

037 Password Recovery Basics-subtitle-en.srt

10.6 KB

037 Password Recovery Basics.mp4

23.0 MB

038 Recovering Saved Passwords From Local Machine-subtitle-en.srt

4.4 KB

038 Recovering Saved Passwords From Local Machine.mp4

8.6 MB

039 Recovering Saved Passwords From A Remote Machine-subtitle-en.srt

16.1 KB

039 Recovering Saved Passwords From A Remote Machine.mp4

25.8 MB

039 run-laZagne.txt

0.9 KB

external_links.txt

0.1 KB

/09 Windows Evil Files - Enhancing Evil Files/

040 Bypassing All Anti-Virus Programs By Modifying Hex Vales-subtitle-en.srt

13.8 KB

040 Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4

23.4 MB

041 Download & Execute Payload-subtitle-en.srt

9.5 KB

041 Download & Execute Payload.mp4

15.6 MB

041 download-and-execute.txt

0.2 KB

042 Creating The Perfect Spying Tool-subtitle-en.srt

9.3 KB

042 Creating The Perfect Spying Tool.mp4

19.8 MB

/10 Windows Evil Files - Converting Evil File To A Trojan/

043 Embedding Evil Files With Any File Type Like An Image Or PDF-subtitle-en.srt

13.9 KB

043 Embedding Evil Files With Any File Type Like An Image Or PDF.mp4

22.1 MB

044 Running Evil Files Silently In The Background-subtitle-en.srt

12.2 KB

044 Running Evil Files Silently In The Background.mp4

24.7 MB

045 Changing Trojan's Icon-subtitle-en.srt

10.5 KB

045 Changing Trojan's Icon.mp4

23.5 MB

046 Spoofing File Extension from _exe to anything else (pdf_ png __etc)-subtitle-en.srt

15.2 KB

046 Spoofing File Extension from _exe to anything else (pdf_ png __etc).mp4

24.8 MB

047 Download & Execute Payload (Method 2)-subtitle-en.srt

8.6 KB

047 Download & Execute Payload (Method 2).mp4

19.8 MB

047 autoit-download-and-execute.txt

0.5 KB

048 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)-subtitle-en.srt

9.3 KB

048 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).mp4

19.2 MB

049 Embedding backdoor In A Legitimate Microsoft Office Document-subtitle-en.srt

10.9 KB

049 Embedding backdoor In A Legitimate Microsoft Office Document.mp4

19.7 MB

050 Embedding Any Evil File In A Legitimate Microsoft Office Document-subtitle-en.srt

12.8 KB

050 Embedding Any Evil File In A Legitimate Microsoft Office Document.mp4

22.0 MB

050 download-and-execute-macro.txt

0.5 KB

external_links.txt

0.1 KB

/11 Mac OS X Evil Files/

051 Introduction-subtitle-en.srt

3.9 KB

051 Introduction.mp4

11.8 MB

052 Hacking Mac OS X Using A Meterpreter Backdoor-subtitle-en.srt

15.5 KB

052 Hacking Mac OS X Using A Meterpreter Backdoor.mp4

36.3 MB

053 Hacking Mac OS X Using An Empire Stager-subtitle-en.srt

9.2 KB

053 Hacking Mac OS X Using An Empire Stager.mp4

15.0 MB

054 Converting Basic Backdoor To An Executable-subtitle-en.srt

4.7 KB

054 Converting Basic Backdoor To An Executable.mp4

8.8 MB

055 Embedding A Normal File With Backdoor-subtitle-en.srt

12.8 KB

055 Embedding A Normal File With Backdoor.mp4

28.0 MB

056 Download & Execute Payload-subtitle-en.srt

9.6 KB

056 Download & Execute Payload.mp4

21.2 MB

057 Changing Trojan's Icon-subtitle-en.srt

8.4 KB

057 Changing Trojan's Icon.mp4

21.2 MB

058 Configuring The Trojan To Run Silently-subtitle-en.srt

8.1 KB

058 Configuring The Trojan To Run Silently.mp4

17.9 MB

059 Embedding Backdoor In A Legitimate Microsoft Office Document-subtitle-en.srt

7.9 KB

059 Embedding Backdoor In A Legitimate Microsoft Office Document.mp4

14.6 MB

/12 Linux Evil Files/

060 Hacking Into Linux-Like Systems Using One Command-subtitle-en.srt

11.7 KB

060 Hacking Into Linux-Like Systems Using One Command.mp4

17.5 MB

061 More Advanced Linux Backdoor-subtitle-en.srt

8.4 KB

061 More Advanced Linux Backdoor.mp4

10.7 MB

062 Generating A Persistent Remote Keylogger-subtitle-en.srt

6.3 KB

062 Generating A Persistent Remote Keylogger.mp4

8.3 MB

063 Using A Remote Keylogger To Capture Key Strikes Including Passwords-subtitle-en.srt

8.6 KB

063 Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4

14.4 MB

064 Recovering Saved Passwords From A Local Machine-subtitle-en.srt

9.7 KB

064 Recovering Saved Passwords From A Local Machine.mp4

16.4 MB

065 Execute & Report Payload-subtitle-en.srt

9.8 KB

065 Execute & Report Payload.mp4

12.2 MB

065 ZReporter.py

0.4 KB

066 Recovering Saved Passwords From A Remote Machine-subtitle-en.srt

8.9 KB

066 Recovering Saved Passwords From A Remote Machine.mp4

16.7 MB

067 Embedding Evil Code In A Legitimate Linux Package - Part 1-subtitle-en.srt

18.0 KB

067 Embedding Evil Code In A Legitimate Linux Package - Part 1.mp4

20.2 MB

068 Embedding Evil Code In A Legitimate Linux Package - Part 2-subtitle-en.srt

7.0 KB

068 Embedding Evil Code In A Legitimate Linux Package - Part 2.mp4

12.4 MB

069 Backdooring a Legitimate Android App-subtitle-en.srt

13.4 KB

069 Backdooring a Legitimate Android App.mp4

19.2 MB

external_links.txt

0.2 KB

/13 Delivery Methods/

070 Introduction-subtitle-en.srt

2.7 KB

070 Introduction.mp4

6.5 MB

071 Preparing Evil Files To Be Delivered Via A URL-subtitle-en.srt

9.2 KB

071 Preparing Evil Files To Be Delivered Via A URL.mp4

11.5 MB

072 Email Spoofing - Send Emails As Any Email Account-subtitle-en.srt

10.6 KB

072 Email Spoofing - Send Emails As Any Email Account.mp4

20.4 MB

073 Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files-subtitle-en.srt

14.5 KB

073 Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.mp4

26.5 MB

074 Creating A Replica Of Any Website _ Login Page-subtitle-en.srt

8.1 KB

074 Creating A Replica Of Any Website _ Login Page.mp4

9.4 MB

075 Stealing Login Info Using Fake A Login Page-subtitle-en.srt

12.0 KB

075 Stealing Login Info Using Fake A Login Page.mp4

18.5 MB

076 BeEF Overview & Basic Hook Method-subtitle-en.srt

9.5 KB

076 BeEF Overview & Basic Hook Method.mp4

14.5 MB

077 Injecting BeEF's Hook In Any Webpage-subtitle-en.srt

6.5 KB

077 Injecting BeEF's Hook In Any Webpage.mp4

11.8 MB

078 Luring Target Into Accessing Evil URL Without Direct Interaction-subtitle-en.srt

14.6 KB

078 Luring Target Into Accessing Evil URL Without Direct Interaction.mp4

21.9 MB

079 Basic BeEF Commands-subtitle-en.srt

6.1 KB

079 Basic BeEF Commands.mp4

12.2 MB

080 Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-en.srt

3.1 KB

080 Stealing Credentials_Passwords Using A Fake Login Prompt.mp4

6.2 MB

081 Hacking Windows 10 Using A Fake Update-subtitle-en.srt

6.6 KB

081 Hacking Windows 10 Using A Fake Update.mp4

9.4 MB

082 Hacking Mac OS X Using A Fake Update-subtitle-en.srt

5.7 KB

082 Hacking Mac OS X Using A Fake Update.mp4

11.5 MB

083 Hacking Linux Using A Fake Update-subtitle-en.srt

6.2 KB

083 Hacking Linux Using A Fake Update.mp4

9.3 MB

external_links.txt

0.2 KB

/14 Using The Above Attacks Outside The Local Network/

084 Overview of the Setup-subtitle-en.srt

8.9 KB

084 Overview of the Setup.mp4

15.8 MB

085 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-en.srt

7.5 KB

085 Ex1 - Generating a Backdoor That Works Outside The Network.mp4

13.9 MB

086 Configuring The Router To Forward Connections To Kali-subtitle-en.srt

9.8 KB

086 Configuring The Router To Forward Connections To Kali.mp4

16.0 MB

087 Ex2 - Using BeEF Outside The Network-subtitle-en.srt

7.5 KB

087 Ex2 - Using BeEF Outside The Network.mp4

16.3 MB

/15 Post Exploitation/

088 Introduction-subtitle-en.srt

3.4 KB

088 Introduction.mp4

7.5 MB

089 Upgrading Basic Shell Access To A Meterpreter_Empire Access-subtitle-en.srt

13.0 KB

089 Upgrading Basic Shell Access To A Meterpreter_Empire Access.mp4

13.1 MB

/16 Post Exploitation - Meterpreter/

090 Meterpreter Basics-subtitle-en.srt

8.3 KB

090 Meterpreter Basics.mp4

16.2 MB

091 File System Commands-subtitle-en.srt

5.7 KB

091 File System Commands.mp4

13.7 MB

092 Maintaining Access Basic Methods-subtitle-en.srt

7.0 KB

092 Maintaining Access Basic Methods.mp4

13.7 MB

093 Maintaining Access - Using a Reliable & undetectable Method-subtitle-en.srt

8.5 KB

093 Maintaining Access - Using a Reliable & undetectable Method.mp4

19.6 MB

094 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-en.srt

3.5 KB

094 Spying - Capturing Key Strikes & Taking Screen Shots.mp4

4.5 MB

095 Pivoting - Theory (What is Pivoting_)-subtitle-en.srt

8.2 KB

095 Pivoting - Theory (What is Pivoting_).mp4

22.8 MB

096 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-en.srt

10.2 KB

096 Pivoting - Exploiting Devices on The Same Network As The Target Computer.mp4

20.7 MB

097 Controlling Android Phone & Accessing Mic_ Camera_ Messages_ File System & More-subtitle-en.srt

12.5 KB

097 Controlling Android Phone & Accessing Mic_ Camera_ Messages_ File System & More.mp4

17.2 MB

098 Maintaining Access On OS X-subtitle-en.srt

13.8 KB

098 Maintaining Access On OS X.mp4

24.1 MB

/17 Post Exploitation - Empire/

099 Basics Of Empire Agents-subtitle-en.srt

8.9 KB

099 Basics Of Empire Agents.mp4

13.1 MB

100 File System Commands-subtitle-en.srt

8.9 KB

100 File System Commands.mp4

13.0 MB

101 Upload & Execute Shell Commands-subtitle-en.srt

6.0 KB

101 Upload & Execute Shell Commands.mp4

10.2 MB

102 Injecting Backdoor Process In System Processes-subtitle-en.srt

12.6 KB

102 Injecting Backdoor Process In System Processes.mp4

22.9 MB

103 Stealing root Password & Escalating Privileges On OS X-subtitle-en.srt

9.9 KB

103 Stealing root Password & Escalating Privileges On OS X.mp4

15.4 MB

104 Maintaining Access On OS X-subtitle-en.srt

7.2 KB

104 Maintaining Access On OS X.mp4

14.3 MB

/18 Security/

105 Detecting Fake_Spoofed Emails-subtitle-en.srt

9.2 KB

105 Detecting Fake_Spoofed Emails.mp4

11.8 MB

106 How to Protect Against BeEF & Other Browser Exploits-subtitle-en.srt

5.5 KB

106 How to Protect Against BeEF & Other Browser Exploits.mp4

11.4 MB

107 Detecting Trojans Manually-subtitle-en.srt

6.8 KB

107 Detecting Trojans Manually.mp4

11.7 MB

108 Detecting Trojans Using a Sandbox-subtitle-en.srt

4.2 KB

108 Detecting Trojans Using a Sandbox.mp4

8.0 MB

external_links.txt

0.1 KB

/19 Bonus Section/

109 Bonus Lecture - What's Next_.html

4.7 KB

/

[FreeCourseSite.com].txt

1.1 KB

[FreeCourseSite.com].url

0.1 KB

 

Total files 232


Copyright © 2024 FileMood.com