This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Social Engineering Attacks
1.INTRODUCTION
1.Social Engineering Defined (1:44)
2.EVIL FILES
1.Create a Malicious File with MSFvenom (3:38)
2.How to Create an Undetectable Payload with FatRat (4:48)
3.Inject Payload in .exe file using Shellter (2:24)
4.Make A Malicious Microsoft Word Document (2:11)
3.EXPLOITATION
1.Meterpreter Basics (2:12)
2.Extract Saved Passwords with LaZagne (1:12)
3.Capture VNC Session (1:05)
4.How to view saved Wi-Fi passwords (2:15)
5.How to perform a Man-in-the-middle (MITM) attack (2:47)
4.SOCIAL ENGINEERING TOOLS
1.How To Create a Fake Login Page Using Setoolkit (2:05)
2.Blackeye Phishing Tool (1:29)
5.BROWSER EXPLOITATION
1.How to Exploit Web Browsers with BeEF (2:57)
2.Hook Web Browsers with MITMf and BeEF (1:14)
3.Gain Full Control over the Target Machine using BeEF (2:28)
6.ATTACKING OUTSIDE THE LOCAL NETWORK
1.Hacking Over the Internet Without Port Forwarding (2:49)
2.How To Use Setoolkit Outside The Local Network (1:24)
3.BeEF Attack Outside the Local Network (2:07)
4.Phishing Email Attack (2:27)
7.SECURITY
1.How to Detect Meterpreter in Your PC (1:27)
3.How to Avoid Phishing Attacks (1:45)
2.Protect Yourself from Browser Exploits (1:20)
1.How To Create a Fake Login Page Using Setoolkit
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock