What you’ll learn
-
Hack updated & patched systems (Windows, Linux, OS X and Android).
-
Generate undetectable backdoors for Windows, Mac OS X, Linux & Android.
-
Generate malware to steal all passwords from Windows & Linux.
-
Embed malware in Microsoft Office documents.
-
Backdoor Android applications.
-
Make evil files (backdoors / keyloggers) look and function like normal files (image, pdf or any other file type).
-
Manually modify malware to bypass anti-virus programs.
-
Advanced malware delivery techniques (through fake pages, fake emails, indirect notifications….etc)
-
Advanced post exploitation.
-
Discover websites, companies, people, emails and social networking accounts associated with a person or a company.
-
Install hacking lab & needed software (on Windows, OS X and Linux)
-
Install Kali Linux – a penetration testing operating system
-
Install windows & vulnerable operating systems as virtual machines for testing
-
Learn linux basics
-
Learn linux commands and how to interact with the terminal
-
Build attack strategies based on the gathered info
-
Generate a remote keylogger that logs every key strike entered on a target computer and sends reports by email.
-
Backdoor Debian packages for Linux
-
Generate OS X backdoors that look and function like normal files (image, pdf ..etc).
-
Hack OS X and Linux computers by using a simple one line command.
-
Send emails from ANY email account.
-
Create fake websites that look exactly like any other website.
-
Create a fake login page and use it to stead passwords.
-
Use smart social engineering techniques to make the target person willingly use our fake website.
-
Deliver malware as fake updates, fake installers ..etc.
-
Read, write download, upload and execute files on compromised systems.
-
Capture key strikes on compromised systems.
-
Use a compromised computer as a pivot to hack other computers on the same network.
-
Maintain your access to the hacked systems even after restart.
-
Escalate your privileges to admin.
-
Analyse files & detect undetectable malware.
-
Use a sandbox to analyse undetectable malware.
-
Access messages, social accounts, camera, GPS …..etc of hacked phone.
Who this course is for:
- People who want to learn ethical hacking / social engineering
- People who want to learn how hackers hack into secure systems that do not have any vulnerabilities
- Anybody who wants to learn how to secure their systems from social engineering attacks
Deal Score0
Disclosure: This post may contain affiliate links and we may get small commission if you make a purchase. Read more about Affiliate disclosure here.