Section 1 : Chapter 1

Lecture 1 Teaser - Hacking An Android Phone & Accessing The 00:05:35 Duration
Lecture 2 Introduction to Social Engineering 00:03:14 Duration
Lecture 3 Course Overview 00:04:16 Duration

Section 2 : Preparation - Creating a Penetration Testing Lab

Lecture 1 Lab Overview & Needed Software 00:07:49 Duration
Lecture 2 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 3 Installing Kali 2020 As a Virtual Machine Using a 00:11:13 Duration
Lecture 4 Installing Windows As a Virtual Machine 00:03:22 Duration
Lecture 5 Installing Ubuntu As a Virtual Machine 00:07:05 Duration

Section 3 : Preparation - Linux Basics

Lecture 1 Basic Overview Of Kali Linux 00:05:10 Duration
Lecture 2 he Linux Terminal & Basic Linux Commands 00:11:21 Duration
Lecture 3 Creating & Using Snapshots 00:05:36 Duration

Section 4 : Information Gathering

Lecture 1 Introduction 00:01:52 Duration

Section 5 : Information Gathering - Gathering Info About A CompanyWebsi

Lecture 1 Maltego Overview 00:07:05 Duration
Lecture 2 Discovering Domain Info & Emails Associated With 00:07:24 Duration
Lecture 3 Discovering Information About Hosting Company, Sup 00:06:56 Duration
Lecture 4 Discovering Files, Links, Websites & Other Compan 00:05:12 Duration
Lecture 5 Using The Gathered Info To Build An Attack Strateg 00:04:17 Duration

Section 6 : Information Gathering - Gathering Info About A Person

Lecture 1 Discovering Websites, Links & Social Networking Ac 00:09:28 Duration
Lecture 2 About Proctor Testing
Lecture 3 Discovering Emails Of The Target's Friends 00:04:39 Duration
Lecture 4 Analysing The Gathered Info & Building An Attac 00:08:41 Duration

Section 7 : Windows Malware

Lecture 1 Introduction 00:02:14 Duration

Section 8 : Windows Malware - Generating Undetectable Backdoors

Lecture 1 Installing Veil Framework 00:03:56 Duration
Lecture 2 Veil Overview & Payload Basics 00:07:20 Duration
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 4 Listening For Incoming Connections 00:07:26 Duration
Lecture 5 Hacking A Windows 10 Machine Using The Generated 00:07:13 Duration
Lecture 6 Introduction to The Fat Rat 00:06:18 Duration
Lecture 7 Generating An Undetectable Backdoor For Windows 00:11:30 Duration
Lecture 8 Introduction to Empire 00:09:18 Duration
Lecture 9 Creating a Windows Powershell Stager & Hacking Win 00:07:30 Duration
Lecture 10 Modifying Backdoor Source To Bypass All Anti-virus 00:08:13 Duration

Section 9 : Windows Malware - Spying

Lecture 1 Introduction to Keyloggers 00:06:34 Duration
Lecture 2 Creating A Remote Keylogger 00:09:03 Duration
Lecture 3 Using A Remote Keylogger To Capture Key Strikes 00:07:31 Duration
Lecture 4 Password Recovery Basics 00:07:29 Duration
Lecture 5 Recovering Saved Passwords From Local Machine 00:03:17 Duration
Lecture 6 Recovering Saved Passwords From A Remote Machine 00:11:52 Duration

Section 10 : Windows Malware - Enhancing Malware

Lecture 1 Bypassing All Anti-Virus Programs By Modifying Hex 00:10:35 Duration
Lecture 2 Download & Execute Payload 00:06:19 Duration
Lecture 3 Creating The Perfect Spying Tool 00:06:50 Duration

Section 11 : Windows Malware - Creating Trojans

Lecture 1 Embedding Evil Files With Any File Type Like An Im
Lecture 2 Running Evil Files Silently In The Background
Lecture 3 Changing Trojan's Icon 00:08:50 Duration
Lecture 4 Spoofing File Extension from .exe to anything 00:11:34 Duration
Lecture 5 Download & Execute Payload (Method 2) 00:06:21 Duration
Lecture 6 Embedding Evil Files With Any File Type Like An
Lecture 7 Embedding a Backdoor In a Legitimate Microsoft Off 00:08:46 Duration
Lecture 8 Embedding Any Evil File In A Legitimate Microsoft 00:10:20 Duration

Section 12 : Mac OS X Malware

Lecture 1 Introduction 00:03:11 Duration
Lecture 2 Hacking Mac OS X Using A Meterpreter Backdoor 00:12:04 Duration
Lecture 3 Hacking Mac OS X Using An Empire Stager 00:06:35 Duration
Lecture 4 Converting Basic Backdoor To An Executable 00:03:34 Duration
Lecture 5 Embedding A Normal File With Backdoor 00:09:20 Duration
Lecture 6 Generating a Basic Trojan For Max OS X 00:06:50 Duration
Lecture 7 Changing Trojan's Icon
Lecture 8 Configuring The Trojan To Run Silently 00:06:15 Duration
Lecture 9 Embedding Backdoor In A Legitimate Microsoft Offic 00:06:11 Duration

Section 13 : Linux Malware

Lecture 1 About Proctor Testing
Lecture 2 Hacking Into Linux-Like Systems Using One Command. 00:08:55 Duration
Lecture 3 More Advanced Linux Backdoor 00:06:35 Duration
Lecture 4 Using A Remote Keylogger To Capture Key Strikes 00:09:59 Duration
Lecture 5 Recovering Saved Passwords From A Local Machine 00:07:12 Duration
Lecture 6 Execute & Report Payload 00:06:57 Duration
Lecture 7 Recovering Saved Passwords From A Remote Machine 00:06:53 Duration
Lecture 8 Embedding Evil Code In A Legitimate Linux Package 00:12:38 Duration
Lecture 9 Embedding Evil Code In A Legitimate Linux Package 00:04:59 Duration
Lecture 10 Backdooring a Legitimate Android App 00:12:14 Duration

Section 14 : Delivery Methods

Lecture 1 Introduction 00:01:51 Duration
Lecture 2 Mail Deliver - Setting up an SMTP Server 00:06:52 Duration
Lecture 3 Mail Delivery - Spoofing Emails 00:11:50 Duration
Lecture 4 Mail Delivery - Spoofing Emails (method 2) 00:08:10 Duration
Lecture 5 Hacking OS X & Linux Using Pure Social Engineering 00:10:10 Duration
Lecture 6 Creating A Replica Of Any Website Login Page. 00:06:02 Duration
Lecture 7 Stealing Login Info Using Fake A Login Page 00:10:25 Duration
Lecture 8 BeEF Overview & Basic Hook Method 00:07:08 Duration
Lecture 9 Injecting BeEF's Hook In Any Webpage 00:04:57 Duration
Lecture 10 About Certification
Lecture 11 Luring Targets Into Accessing Evil URL Without Di 00:10:45 Duration
Lecture 12 Basic BeEF Commands 00:04:24 Duration
Lecture 13 Stealing CredentialsPasswords Using A Fake Login 00:02:17 Duration
Lecture 14 Hacking Windows 10 Using A Fake Update 00:04:41 Duration
Lecture 15 Hacking Mac OS X Using A Fake Update 00:04:29 Duration
Lecture 16 Hacking Linux Using A Fake Update 00:04:46 Duration

Section 15 : Using The Above Attacks Outside The Local Network

Lecture 1 Overview of the Setup 00:05:56 Duration
Lecture 2 Ex1 - Generating a Backdoor That Works Outside Th 00:05:24 Duration
Lecture 3 Configuring The Router To Forward Connections 00:06:59 Duration
Lecture 4 Ex2 - Using BeEF Outside The Network 00:05:50 Duration

Section 16 : Using The Above Attacks Outside The Local Network (2nd Metho

Lecture 1 Overview - Exposing Local HTTP Services to the In 00:09:13 Duration
Lecture 2 Receiving Backdoor Connections Over The Internet 00:09:19 Duration
Lecture 3 Using BeEF Over The Internet 00:08:04 Duration

Section 17 : Post Exploitation

Lecture 1 Introduction 00:02:12 Duration
Lecture 2 Upgrading Basic Shell Access To A MeterpreterEmpi 00:09:07 Duration

Section 18 : Post Exploitation - Meterpreter

Lecture 1 Meterpreter Basics 00:06:22 Duration
Lecture 2 File System Commands 00:05:10 Duration
Lecture 3 Maintaining Access Basic Methods 00:05:07 Duration
Lecture 4 Maintaining Access - Using a Reliable & undetectab 00:06:53 Duration
Lecture 5 Spying - Capturing Key Strikes & Taking Screen 00:02:40 Duration
Lecture 6 Pivoting - Theory (What is Pivoting) 00:07:07 Duration
Lecture 7 Pivoting - Exploiting Devices on The Same Network 00:08:11 Duration
Lecture 8 Controlling Android Phone & Accessing Mic, Camer 00:08:44 Duration
Lecture 9 Maintaining Access On OS X 00:10:28 Duration

Section 19 : Post Exploitation - Empire

Lecture 1 Basics Of Empire Agents 00:06:31 Duration
Lecture 2 File System Commands 00:06:44 Duration
Lecture 3 Upload & Execute Shell Commands 00:04:34 Duration
Lecture 4 Injecting a Backdoor In a System Processes
Lecture 5 2 Methods to Escalating Privileges On OS X 00:07:16 Duration
Lecture 6 Maintaining Access On OS X 00:05:35 Duration

Section 20 : Security

Lecture 1 Detecting FakeSpoofed Emails 00:06:09 Duration
Lecture 2 How to Protect Against BeEF & Other Browser Exploi 00:04:18 Duration
Lecture 3 Detecting Trojans Manually 00:05:32 Duration
Lecture 4 Detecting Trojans Using a Sandbox 00:03:17 Duration