Section 1 : Chapter 1
|
Lecture 1 | Teaser - Hacking An Android Phone & Accessing The | 00:05:35 Duration |
|
Lecture 2 | Introduction to Social Engineering | 00:03:14 Duration |
|
Lecture 3 | Course Overview | 00:04:16 Duration |
Section 2 : Preparation - Creating a Penetration Testing Lab
|
Lecture 1 | Lab Overview & Needed Software | 00:07:49 Duration |
|
Lecture 2 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 3 | Installing Kali 2020 As a Virtual Machine Using a | 00:11:13 Duration |
|
Lecture 4 | Installing Windows As a Virtual Machine | 00:03:22 Duration |
|
Lecture 5 | Installing Ubuntu As a Virtual Machine | 00:07:05 Duration |
Section 3 : Preparation - Linux Basics
|
Lecture 1 | Basic Overview Of Kali Linux | 00:05:10 Duration |
|
Lecture 2 | he Linux Terminal & Basic Linux Commands | 00:11:21 Duration |
|
Lecture 3 | Creating & Using Snapshots | 00:05:36 Duration |
Section 4 : Information Gathering
|
Lecture 1 | Introduction | 00:01:52 Duration |
Section 5 : Information Gathering - Gathering Info About A CompanyWebsi
|
Lecture 1 | Maltego Overview | 00:07:05 Duration |
|
Lecture 2 | Discovering Domain Info & Emails Associated With | 00:07:24 Duration |
|
Lecture 3 | Discovering Information About Hosting Company, Sup | 00:06:56 Duration |
|
Lecture 4 | Discovering Files, Links, Websites & Other Compan | 00:05:12 Duration |
|
Lecture 5 | Using The Gathered Info To Build An Attack Strateg | 00:04:17 Duration |
Section 6 : Information Gathering - Gathering Info About A Person
|
Lecture 1 | Discovering Websites, Links & Social Networking Ac | 00:09:28 Duration |
|
Lecture 2 | About Proctor Testing | |
|
Lecture 3 | Discovering Emails Of The Target's Friends | 00:04:39 Duration |
|
Lecture 4 | Analysing The Gathered Info & Building An Attac | 00:08:41 Duration |
Section 7 : Windows Malware
|
Lecture 1 | Introduction | 00:02:14 Duration |
Section 8 : Windows Malware - Generating Undetectable Backdoors
|
Lecture 1 | Installing Veil Framework | 00:03:56 Duration |
|
Lecture 2 | Veil Overview & Payload Basics | 00:07:20 Duration |
|
Lecture 3 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 4 | Listening For Incoming Connections | 00:07:26 Duration |
|
Lecture 5 | Hacking A Windows 10 Machine Using The Generated | 00:07:13 Duration |
|
Lecture 6 | Introduction to The Fat Rat | 00:06:18 Duration |
|
Lecture 7 | Generating An Undetectable Backdoor For Windows | 00:11:30 Duration |
|
Lecture 8 | Introduction to Empire | 00:09:18 Duration |
|
Lecture 9 | Creating a Windows Powershell Stager & Hacking Win | 00:07:30 Duration |
|
Lecture 10 | Modifying Backdoor Source To Bypass All Anti-virus | 00:08:13 Duration |
Section 9 : Windows Malware - Spying
|
Lecture 1 | Introduction to Keyloggers | 00:06:34 Duration |
|
Lecture 2 | Creating A Remote Keylogger | 00:09:03 Duration |
|
Lecture 3 | Using A Remote Keylogger To Capture Key Strikes | 00:07:31 Duration |
|
Lecture 4 | Password Recovery Basics | 00:07:29 Duration |
|
Lecture 5 | Recovering Saved Passwords From Local Machine | 00:03:17 Duration |
|
Lecture 6 | Recovering Saved Passwords From A Remote Machine | 00:11:52 Duration |
Section 10 : Windows Malware - Enhancing Malware
|
Lecture 1 | Bypassing All Anti-Virus Programs By Modifying Hex | 00:10:35 Duration |
|
Lecture 2 | Download & Execute Payload | 00:06:19 Duration |
|
Lecture 3 | Creating The Perfect Spying Tool | 00:06:50 Duration |
Section 11 : Windows Malware - Creating Trojans
|
Lecture 1 | Embedding Evil Files With Any File Type Like An Im | |
|
Lecture 2 | Running Evil Files Silently In The Background | |
|
Lecture 3 | Changing Trojan's Icon | 00:08:50 Duration |
|
Lecture 4 | Spoofing File Extension from .exe to anything | 00:11:34 Duration |
|
Lecture 5 | Download & Execute Payload (Method 2) | 00:06:21 Duration |
|
Lecture 6 | Embedding Evil Files With Any File Type Like An | |
|
Lecture 7 | Embedding a Backdoor In a Legitimate Microsoft Off | 00:08:46 Duration |
|
Lecture 8 | Embedding Any Evil File In A Legitimate Microsoft | 00:10:20 Duration |
Section 12 : Mac OS X Malware
|
Lecture 1 | Introduction | 00:03:11 Duration |
|
Lecture 2 | Hacking Mac OS X Using A Meterpreter Backdoor | 00:12:04 Duration |
|
Lecture 3 | Hacking Mac OS X Using An Empire Stager | 00:06:35 Duration |
|
Lecture 4 | Converting Basic Backdoor To An Executable | 00:03:34 Duration |
|
Lecture 5 | Embedding A Normal File With Backdoor | 00:09:20 Duration |
|
Lecture 6 | Generating a Basic Trojan For Max OS X | 00:06:50 Duration |
|
Lecture 7 | Changing Trojan's Icon | |
|
Lecture 8 | Configuring The Trojan To Run Silently | 00:06:15 Duration |
|
Lecture 9 | Embedding Backdoor In A Legitimate Microsoft Offic | 00:06:11 Duration |
Section 13 : Linux Malware
|
Lecture 1 | About Proctor Testing | |
|
Lecture 2 | Hacking Into Linux-Like Systems Using One Command. | 00:08:55 Duration |
|
Lecture 3 | More Advanced Linux Backdoor | 00:06:35 Duration |
|
Lecture 4 | Using A Remote Keylogger To Capture Key Strikes | 00:09:59 Duration |
|
Lecture 5 | Recovering Saved Passwords From A Local Machine | 00:07:12 Duration |
|
Lecture 6 | Execute & Report Payload | 00:06:57 Duration |
|
Lecture 7 | Recovering Saved Passwords From A Remote Machine | 00:06:53 Duration |
|
Lecture 8 | Embedding Evil Code In A Legitimate Linux Package | 00:12:38 Duration |
|
Lecture 9 | Embedding Evil Code In A Legitimate Linux Package | 00:04:59 Duration |
|
Lecture 10 | Backdooring a Legitimate Android App | 00:12:14 Duration |
Section 14 : Delivery Methods
Section 15 : Using The Above Attacks Outside The Local Network
|
Lecture 1 | Overview of the Setup | 00:05:56 Duration |
|
Lecture 2 | Ex1 - Generating a Backdoor That Works Outside Th | 00:05:24 Duration |
|
Lecture 3 | Configuring The Router To Forward Connections | 00:06:59 Duration |
|
Lecture 4 | Ex2 - Using BeEF Outside The Network | 00:05:50 Duration |
Section 16 : Using The Above Attacks Outside The Local Network (2nd Metho
|
Lecture 1 | Overview - Exposing Local HTTP Services to the In | 00:09:13 Duration |
|
Lecture 2 | Receiving Backdoor Connections Over The Internet | 00:09:19 Duration |
|
Lecture 3 | Using BeEF Over The Internet | 00:08:04 Duration |
Section 17 : Post Exploitation
|
Lecture 1 | Introduction | 00:02:12 Duration |
|
Lecture 2 | Upgrading Basic Shell Access To A MeterpreterEmpi | 00:09:07 Duration |
Section 18 : Post Exploitation - Meterpreter
|
Lecture 1 | Meterpreter Basics | 00:06:22 Duration |
|
Lecture 2 | File System Commands | 00:05:10 Duration |
|
Lecture 3 | Maintaining Access Basic Methods | 00:05:07 Duration |
|
Lecture 4 | Maintaining Access - Using a Reliable & undetectab | 00:06:53 Duration |
|
Lecture 5 | Spying - Capturing Key Strikes & Taking Screen | 00:02:40 Duration |
|
Lecture 6 | Pivoting - Theory (What is Pivoting) | 00:07:07 Duration |
|
Lecture 7 | Pivoting - Exploiting Devices on The Same Network | 00:08:11 Duration |
|
Lecture 8 | Controlling Android Phone & Accessing Mic, Camer | 00:08:44 Duration |
|
Lecture 9 | Maintaining Access On OS X | 00:10:28 Duration |
Section 19 : Post Exploitation - Empire
|
Lecture 1 | Basics Of Empire Agents | 00:06:31 Duration |
|
Lecture 2 | File System Commands | 00:06:44 Duration |
|
Lecture 3 | Upload & Execute Shell Commands | 00:04:34 Duration |
|
Lecture 4 | Injecting a Backdoor In a System Processes | |
|
Lecture 5 | 2 Methods to Escalating Privileges On OS X | 00:07:16 Duration |
|
Lecture 6 | Maintaining Access On OS X | 00:05:35 Duration |
Section 20 : Security
|
Lecture 1 | Detecting FakeSpoofed Emails | 00:06:09 Duration |
|
Lecture 2 | How to Protect Against BeEF & Other Browser Exploi | 00:04:18 Duration |
|
Lecture 3 | Detecting Trojans Manually | 00:05:32 Duration |
|
Lecture 4 | Detecting Trojans Using a Sandbox | 00:03:17 Duration |