Learn Social Engineering From Scratch Free Download








In this course you will learn following topics which is really important topics for everyone who want to became a ethical hacker & cyber security expert.

  •     Learn about ethical hacking.
  •     About Social engineering.
  •     Social engineering is so dangerous in detailed.
  •     The different fields of ethical hacking.
  •     Kali Linux Learn a penetration testing OS.
  •     Discover websites companies, people, emails.
  •     Build attack strategies.
  •     Generate undetectable backdoor.
  •     Learn Generate Trojans seal passwords, usernames.
  •     Generate a remote keyloggers.
  •     Modify malware to make it bypass antivirus programs detailed.
  •     Analise files & detect undetectable malware.
Requirements for this course:

Basic requirement for this course also if you have some programming knowledge so! your prefect for this course,

  •     Basic IT Skills.
  •     Computer with a minimum of 4GB ram,
  •     Operating System.
  •     Learn What Is Social Engineering.
  •     Hacking an Android Phone & Accessing the Camera.
  •     Preparation Creating a Penetration Testing Lab.
  •     Installing Kali 2018 as a Virtual Machine Using a Ready Image.
  •     Basic Overview of Kali Linux.
  •     The Linux Terminal & Basic Linux Commands.
  •     Creating & Using Snapshots.
  •     Domain Info and Emails of Target.
  •     Info Hosting Company, Support Team Emails & Admin Email.
  •     Files, Links, Websites & Other Companies Related To Target.
  •     Using the Gathered Info To Build An Attack Strategy.
  •     Information Gathering – Gathering Info about a Person.
Short Overview of the Course:

1. Information Gathering:

    Information Gathering Info about a Company-Website.
    Malt-ego Overview.

2. Discovering Info-:

3. Discovering Websites, Links/Social Networking Accounts

  •     Twitter Friends & Associated Accounts,
  •     Emails of the Target’s Friends,
  •     Analyzing the Gathered Info & Building an Attack Strategy.
  •     Windows Evil Files.
  •     Generating Undetectable Backdoors.
  •     Installing Veil 3.1.
  •     Veil Overview & Payloads Basics.
  •     Generating an Undetectable Backdoor Using Veil 3.
  •     Listening For Incoming Connections.
  •     Hacking a Windows 10 Machine Using the Generated Backdoor.

4. Installing the Fat Rat:

  •     Generating an Undetectable Backdoor Using the FatRat.
  •     Installing Empire.
  •     Creating an Empire Listener.
  •     Creating a Windows Powers-hell Stager and Hacking Windows 10.
  •     Modifying Backdoor Source to Bypass All Anti-virus Programs.
  •     Windows Evil Files – Spying.