Learn Social Engineering From Scratch Free Download
In this course you will learn following topics which is really important topics for everyone who want to became a ethical hacker & cyber security expert.
- Learn about ethical hacking.
- About Social engineering.
- Social engineering is so dangerous in detailed.
- The different fields of ethical hacking.
- Kali Linux Learn a penetration testing OS.
- Discover websites companies, people, emails.
- Build attack strategies.
- Generate undetectable backdoor.
- Learn Generate Trojans seal passwords, usernames.
- Generate a remote keyloggers.
- Modify malware to make it bypass antivirus programs detailed.
- Analise files & detect undetectable malware.
Basic requirement for this course also if you have some programming knowledge so! your prefect for this course,
- Basic IT Skills.
- Computer with a minimum of 4GB ram,
- Operating System.
- Learn What Is Social Engineering.
- Hacking an Android Phone & Accessing the Camera.
- Preparation Creating a Penetration Testing Lab.
- Installing Kali 2018 as a Virtual Machine Using a Ready Image.
- Basic Overview of Kali Linux.
- The Linux Terminal & Basic Linux Commands.
- Creating & Using Snapshots.
- Domain Info and Emails of Target.
- Info Hosting Company, Support Team Emails & Admin Email.
- Files, Links, Websites & Other Companies Related To Target.
- Using the Gathered Info To Build An Attack Strategy.
- Information Gathering – Gathering Info about a Person.
1. Information Gathering:
Information Gathering Info about a Company-Website.
Malt-ego Overview.
2. Discovering Info-:
3. Discovering Websites, Links/Social Networking Accounts
- Twitter Friends & Associated Accounts,
- Emails of the Target’s Friends,
- Analyzing the Gathered Info & Building an Attack Strategy.
- Windows Evil Files.
- Generating Undetectable Backdoors.
- Installing Veil 3.1.
- Veil Overview & Payloads Basics.
- Generating an Undetectable Backdoor Using Veil 3.
- Listening For Incoming Connections.
- Hacking a Windows 10 Machine Using the Generated Backdoor.
4. Installing the Fat Rat:
- Generating an Undetectable Backdoor Using the FatRat.
- Installing Empire.
- Creating an Empire Listener.
- Creating a Windows Powers-hell Stager and Hacking Windows 10.
- Modifying Backdoor Source to Bypass All Anti-virus Programs.
- Windows Evil Files – Spying.
0 Comments