Torrent Info
Title Udemy - Learn Social Engineering From Scratch
Category
Size 1.62GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
000. What Is Social Engineering.mp4 10.94MB
001. Teaser - Hacking An Android Phone & Accessing The Camera.mp4 15.43MB
002. Course Overview.mp4 10.61MB
003. Lab Overview & Needed Software.mp4 6.67MB
004. Installing Kali 2017 As a Virtual Machine Using a Ready Image.mp4 22.74MB
005. Installing Windows As a Virtual Machine.mp4 9.35MB
006. Installing Ubuntu As a Virtual Machine.mp4 13.52MB
007. Basic Overview Of Kali Linux.mp4 14.39MB
008. The Linux Terminal & Basic Linux Commands.mp4 30.85MB
009. Creating & Using Snapshots.mp4 15.25MB
010. Updating Sources & Installing Programs.mp4 17.88MB
011. Introduction.mp4 4.60MB
012. Maltego Overview.mp4 14.34MB
013. Discovering Domain Info & Emails Associated With Target.mp4 12.70MB
014. Discovering Information About Hosting Company, Support Team Emails & Admin Email.mp4 14.08MB
015. Discovering Files, Links, Websites & Other Companies Related To Target.mp4 13.51MB
016. Using The Gathered Info To Build An Attack Stratigy.mp4 9.09MB
017. Discovering Websites, Links & Social Networking Accounts.mp4 22.48MB
018. Discovering Twitter Friends & Associated Accounts.mp4 9.35MB
019. Discovering Emails Of The Target's Friends.mp4 8.99MB
020. Analysing The Gathered Info & Building An Attack Stratigy.mp4 21.15MB
021. Introduction.mp4 5.05MB
022. Installing Veil 3.0.mp4 15.32MB
023. Veil Overview & Payloads Basics.mp4 11.52MB
024. Generating An Undetectable Backdoor Using Veil 3.mp4 20.76MB
025. Listening For Incoming Connections.mp4 12.67MB
026. Hacking A Windows 10 Machine Using The Generated Backdoor.mp4 15.96MB
027. Installing The Fat Rat.mp4 13.62MB
028. Generating An Undetectable Backdoor Using TheFatRat.mp4 27.01MB
029. Installing Empire.mp4 12.62MB
030. Creating An Empire Listener.mp4 12.21MB
031. Crating a Windows Powershell Stager & Hacking Windows 10.mp4 16.19MB
032. Modifying Backdoor Source To Bypass All Anti-virus Programs.mp4 14.02MB
033. What Is A Keylogger.mp4 15.61MB
034. Creating A Remote Keylogger.mp4 11.06MB
035. Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 17.34MB
036. Password Recovery Basics.mp4 21.92MB
037. Recovering Saved Passwords From Local Machine.mp4 8.16MB
038. Recovering Saved Passwords From A Remote Machine.mp4 24.61MB
040. Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4 28.31MB
041. Download & Execute Payload.mp4 14.91MB
043. Creating The Perfect Spying Tool.mp4 18.84MB
044. Embedding Evil Files With Any File Type Like An Image Or PDF.mp4 21.10MB
045. Running Evil Files Silently In The Background.mp4 23.53MB
046. Changing Trojan's Icon.mp4 22.38MB
047. Spoofing File Extension from .exe to anything else (pdf, png ..etc).mp4 23.68MB
048. Download & Execute Payload (Method 2).mp4 18.93MB
050. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).mp4 18.34MB
051. Embedding backdoor In A Legitimate Microsoft Office Document.mp4 18.82MB
052. Embedding Any Evil File In A Legitimate Microsoft Office Document.mp4 20.95MB
054. Introduction.mp4 11.30MB
055. Hacking Mac OS X Using A Meterpreter Backdoor.mp4 34.59MB
056. Hacking Mac OS X Using An Empire Stager.mp4 14.31MB
057. Converting Basic Backdoor To An Executable.mp4 8.43MB
058. Embedding A Normal File With Backdoor.mp4 26.70MB
059. Download & Execute Payload.mp4 20.18MB
060. Changing Trojan's Icon.mp4 20.23MB
061. Configuring The Trojan To Run Silently.mp4 17.06MB
062. Embedding Backdoor In A Legitimate Microsoft Office Document.mp4 13.88MB
063. Hacking Into Linux-Like Systems Using One Command.mp4 16.72MB
064. More Advanced Linux Backdoor.mp4 10.24MB
065. Generating A Persistant Remote Keylogger.mp4 7.94MB
066. Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 13.72MB
067. Recovering Saved Passwords From A Local Machine.mp4 15.60MB
068. Execute & Report Payload.mp4 11.66MB
070. Recovering Saved Passwords From A Remote Machine.mp4 15.92MB
071. Embedding Evil Code In A Legitimate Linux Package - Part 1.mp4 19.24MB
072. Embedding Evil Code In A Legitimate Linux Package - Part 2.mp4 11.87MB
073. Backdooring a Legitimate Android App.mp4 18.28MB
074. Introduction.mp4 6.21MB
075. Preparing Evil Files To Be Delivered Via A URL.mp4 11.00MB
076. Email Spoofing - Send Emails As Any Email Account.mp4 19.42MB
077. Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.mp4 25.30MB
078. Creating A Replica Of Any Website Login Page.mp4 8.97MB
079. Stealing Login Info Using Fake A Login Page.mp4 17.62MB
080. BeEF Overview & Basic Hook Method.mp4 13.84MB
081. Injecting BeEF's Hook In Any Webpage.mp4 11.29MB
082. Luring Target Into Accessing Evil URL Without Direct Interaction.mp4 20.91MB
083. Basic BeEF Commands.mp4 11.64MB
084. Stealing Credentials Passwords Using A Fake Login Prompt.mp4 5.94MB
085. Hacking Windows 10 Using A Fake Update.mp4 8.94MB
086. Hacking Mac OS X Using A Fake Update.mp4 10.99MB
087. Hacking Linux Using A Fake Update.mp4 8.87MB
088. Overview of the Setup.mp4 15.04MB
089. Ex1 - Generating a Backdoor That Works Outside The Network.mp4 13.23MB
090. Configuring The Router To Forward Connections To Kali.mp4 15.25MB
091. Ex2 - Using BeEF Outside The Network.mp4 15.53MB
092. Introduction.mp4 7.17MB
093. Upgrading Basic Shell Access To A Meterpreter Empire Access.mp4 12.46MB
094. Automatically Execute Commands When A Reverse Shell Is Spawned.mp4 11.17MB
095. Meterpreter Basics.mp4 15.43MB
096. File System Commands.mp4 13.04MB
097. Maintaining Access Basic Methods.mp4 13.03MB
098. Maintaining Access - Using a Reliable & undetectable Method.mp4 18.68MB
099. Spying - Capturing Key Strikes & Taking Screen Shots.mp4 4.31MB
100. Pivoting - Theory (What is Pivoting ).mp4 21.76MB
101. Pivoting - Exploiting Devices on The Same Network As The Target Computer.mp4 19.74MB
102. Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More.mp4 16.40MB
103. Maintaining Access On OS X.mp4 22.97MB
104. Basics Of Empire Agents.mp4 12.48MB
105. File System Commands.mp4 12.39MB
106. Upload & Execute Shell Commands.mp4 9.71MB
107. Injecting Backdoor Process In System Processes.mp4 21.88MB
108. Stealing root Password & Escalating Privileges On OS X.mp4 14.69MB
109. Maintaining Access On OS X.mp4 13.64MB
110. Detecting Fake Spoofed Emails.mp4 11.30MB
111. How to Protect Against BeEF & Other Browser Exploits.mp4 13.78MB
112. Detecting Trojans Manually.mp4 11.15MB
113. Detecting Trojans Using a Sandbox.mp4 7.64MB
autoit-download-and-execute.txt 513B
download-and-execute.txt 216B
download-and-execute-macro.txt 483B
run-laZagne.txt 862B
ZReporter.py 428B
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent