Section 1 : Chapter 1

Lecture 1 Teaser - Hacking An Android Phone & Accessing The 5:35
Lecture 2 Introduction to Social Engineering 3:14
Lecture 3 Course Overview 4:16

Section 2 : Preparation - Creating a Penetration Testing Lab

Lecture 4 Lab Overview & Needed Software 7:49
Lecture 5 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 6 Installing Kali 2020 As a Virtual Machine Using a 11:13
Lecture 7 Installing Windows As a Virtual Machine 3:22
Lecture 8 Installing Ubuntu As a Virtual Machine 7:5

Section 3 : Preparation - Linux Basics

Lecture 9 Basic Overview Of Kali Linux 5:10
Lecture 10 he Linux Terminal & Basic Linux Commands 11:21
Lecture 11 Creating & Using Snapshots 5:36

Section 4 : Information Gathering

Lecture 12 Introduction 1:52

Section 5 : Information Gathering - Gathering Info About A CompanyWebsi

Lecture 13 Maltego Overview 7:5
Lecture 14 Discovering Domain Info & Emails Associated With 7:24
Lecture 15 Discovering Information About Hosting Company, Sup 6:56
Lecture 16 Discovering Files, Links, Websites & Other Compan 5:12
Lecture 17 Using The Gathered Info To Build An Attack Strateg 4:17

Section 6 : Information Gathering - Gathering Info About A Person

Lecture 18 Discovering Websites, Links & Social Networking Ac 9:28
Lecture 19 About Proctor Testing Pdf
Lecture 20 Discovering Emails Of The Target's Friends 4:39
Lecture 21 Analysing The Gathered Info & Building An Attac 8:41

Section 7 : Windows Malware

Lecture 22 Introduction 2:14

Section 8 : Windows Malware - Generating Undetectable Backdoors

Lecture 23 Installing Veil Framework 3:56
Lecture 24 Veil Overview & Payload Basics 7:20
Lecture 25 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 26 Listening For Incoming Connections 7:26
Lecture 27 Hacking A Windows 10 Machine Using The Generated 7:13
Lecture 28 Introduction to The Fat Rat 6:18
Lecture 29 Generating An Undetectable Backdoor For Windows 11:30
Lecture 30 Introduction to Empire 9:18
Lecture 31 Creating a Windows Powershell Stager & Hacking Win 7:30
Lecture 32 Modifying Backdoor Source To Bypass All Anti-virus 8:13

Section 9 : Windows Malware - Spying

Lecture 33 Introduction to Keyloggers 6:34
Lecture 34 Creating A Remote Keylogger 9:3
Lecture 35 Using A Remote Keylogger To Capture Key Strikes 7:31
Lecture 36 Password Recovery Basics 7:29
Lecture 37 Recovering Saved Passwords From Local Machine 3:17
Lecture 38 Recovering Saved Passwords From A Remote Machine 11:52

Section 10 : Windows Malware - Enhancing Malware

Lecture 39 Bypassing All Anti-Virus Programs By Modifying Hex 10:35
Lecture 40 Download & Execute Payload 6:19
Lecture 41 Creating The Perfect Spying Tool 6:50

Section 11 : Windows Malware - Creating Trojans

Lecture 42 Embedding Evil Files With Any File Type Like An Im
Lecture 43 Running Evil Files Silently In The Background
Lecture 44 Changing Trojan's Icon 8:50
Lecture 45 Spoofing File Extension from .exe to anything 11:34
Lecture 46 Download & Execute Payload (Method 2) 6:21
Lecture 47 Embedding Evil Files With Any File Type Like An
Lecture 48 Embedding a Backdoor In a Legitimate Microsoft Off 8:46
Lecture 49 Embedding Any Evil File In A Legitimate Microsoft 10:20

Section 12 : Mac OS X Malware

Lecture 50 Introduction 3:11
Lecture 51 Hacking Mac OS X Using A Meterpreter Backdoor 12:4
Lecture 52 Hacking Mac OS X Using An Empire Stager 6:35
Lecture 53 Converting Basic Backdoor To An Executable 3:34
Lecture 54 Embedding A Normal File With Backdoor 9:20
Lecture 55 Generating a Basic Trojan For Max OS X 6:50
Lecture 56 Changing Trojan's Icon
Lecture 57 Configuring The Trojan To Run Silently 6:15
Lecture 58 Embedding Backdoor In A Legitimate Microsoft Offic 6:11

Section 13 : Linux Malware

Lecture 59 About Proctor Testing Pdf
Lecture 60 Hacking Into Linux-Like Systems Using One Command. 8:55
Lecture 61 More Advanced Linux Backdoor 6:35
Lecture 62 Using A Remote Keylogger To Capture Key Strikes 9:59
Lecture 63 Recovering Saved Passwords From A Local Machine 7:12
Lecture 64 Execute & Report Payload 6:57
Lecture 65 Recovering Saved Passwords From A Remote Machine 6:53
Lecture 66 Embedding Evil Code In A Legitimate Linux Package 12:38
Lecture 67 Embedding Evil Code In A Legitimate Linux Package 4:59
Lecture 68 Backdooring a Legitimate Android App 12:14

Section 14 : Delivery Methods

Lecture 69 Introduction 1:51
Lecture 70 Mail Deliver - Setting up an SMTP Server 6:52
Lecture 71 Mail Delivery - Spoofing Emails 11:50
Lecture 72 Mail Delivery - Spoofing Emails (method 2) 8:10
Lecture 73 Hacking OS X & Linux Using Pure Social Engineering 10:10
Lecture 74 Creating A Replica Of Any Website Login Page. 6:2
Lecture 75 Stealing Login Info Using Fake A Login Page 10:25
Lecture 76 BeEF Overview & Basic Hook Method 7:8
Lecture 77 Injecting BeEF's Hook In Any Webpage 4:57
Lecture 78 About Certification Pdf
Lecture 79 Luring Targets Into Accessing Evil URL Without Di 10:45
Lecture 80 Basic BeEF Commands 4:24
Lecture 81 Stealing CredentialsPasswords Using A Fake Login 2:17
Lecture 82 Hacking Windows 10 Using A Fake Update 4:41
Lecture 83 Hacking Mac OS X Using A Fake Update 4:29
Lecture 84 Hacking Linux Using A Fake Update 4:46

Section 15 : Using The Above Attacks Outside The Local Network

Lecture 85 Overview of the Setup 5:56
Lecture 86 Ex1 - Generating a Backdoor That Works Outside Th 5:24
Lecture 87 Configuring The Router To Forward Connections 6:59
Lecture 88 Ex2 - Using BeEF Outside The Network 5:50

Section 16 : Using The Above Attacks Outside The Local Network (2nd Metho

Lecture 89 Overview - Exposing Local HTTP Services to the In 9:13
Lecture 90 Receiving Backdoor Connections Over The Internet 9:19
Lecture 91 Using BeEF Over The Internet 8:4

Section 17 : Post Exploitation

Lecture 92 Introduction 2:12
Lecture 93 Upgrading Basic Shell Access To A MeterpreterEmpi 9:7

Section 18 : Post Exploitation - Meterpreter

Lecture 94 Meterpreter Basics 6:22
Lecture 95 File System Commands 5:10
Lecture 96 Maintaining Access Basic Methods 5:7
Lecture 97 Maintaining Access - Using a Reliable & undetectab 6:53
Lecture 98 Spying - Capturing Key Strikes & Taking Screen 2:40
Lecture 99 Pivoting - Theory (What is Pivoting) 7:7
Lecture 100 Pivoting - Exploiting Devices on The Same Network 8:11
Lecture 101 Controlling Android Phone & Accessing Mic, Camer 8:44
Lecture 102 Maintaining Access On OS X 10:28

Section 19 : Post Exploitation - Empire

Lecture 103 Basics Of Empire Agents 6:31
Lecture 104 File System Commands 6:44
Lecture 105 Upload & Execute Shell Commands 4:34
Lecture 106 Injecting a Backdoor In a System Processes Pdf
Lecture 107 2 Methods to Escalating Privileges On OS X 7:16
Lecture 108 Maintaining Access On OS X 5:35

Section 20 : Security

Lecture 109 Detecting FakeSpoofed Emails 6:9
Lecture 110 How to Protect Against BeEF & Other Browser Exploi 4:18
Lecture 111 Detecting Trojans Manually 5:32
Lecture 112 Detecting Trojans Using a Sandbox 3:17