Udemy - Learn Social Engineering From Scratch
- Category Other
- Type Tutorials
- Language English
- Total size 1.6 GB
- Uploaded By uefiboot024
- Downloads 895
- Last checked 5 days ago
- Date uploaded 7 years ago
- Seeders 10
- Leechers 1
Infohash : BB6BF22555117E061B5B44F6257F8F182EDDEE6B
Udemy - Learn Social Engineering From Scratch
Files:
[FreeCourseSite.com] Udemy - Learn Social Engineering From Scratch 001 What Is Social Engineering- 001 What Is Social Engineering-subtitle-en.srt (4.6 KB)
- 001 What Is Social Engineering.mp4 (10.9 MB)
- 002 Teaser - Hacking An Android Phone & Accessing The Camera-subtitle-en.srt (7.9 KB)
- 002 Teaser - Hacking An Android Phone & Accessing The Camera.mp4 (15.4 MB)
- 003 Course Overview-subtitle-en.srt (6.1 KB)
- 003 Course Overview.mp4 (10.6 MB)
- 004 Lab Overview & Needed Software-subtitle-en.srt (5.1 KB)
- 004 Lab Overview & Needed Software.mp4 (6.7 MB)
- 005 Installing Kali E7 As a Virtual Machine Using a Ready Image-subtitle-en.srt (11.7 KB)
- 005 Installing Kali E7 As a Virtual Machine Using a Ready Image.mp4 (21.0 MB)
- 006 Installing Windows As a Virtual Machine-subtitle-en.srt (4.6 KB)
- 006 Installing Windows As a Virtual Machine.mp4 (9.3 MB)
- 007 Installing Ubuntu As a Virtual Machine-subtitle-en.srt (10.0 KB)
- 007 Installing Ubuntu As a Virtual Machine.mp4 (13.5 MB)
- external_links.txt (0.4 KB)
- 008 Basic Overview Of Kali Linux-subtitle-en.srt (6.2 KB)
- 008 Basic Overview Of Kali Linux.mp4 (14.4 MB)
- 009 The Linux Terminal & Basic Linux Commands-subtitle-en.srt (12.7 KB)
- 009 The Linux Terminal & Basic Linux Commands.mp4 (30.9 MB)
- 010 Creating & Using Snapshots-subtitle-en.srt (9.3 KB)
- 010 Creating & Using Snapshots.mp4 (15.3 MB)
- 011 Updating Sources & Installing Programs-subtitle-en.srt (6.8 KB)
- 011 Updating Sources & Installing Programs.mp4 (17.9 MB)
- 012 Introduction-subtitle-en.srt (2.6 KB)
- 012 Introduction.mp4 (4.6 MB)
- 013 Maltego Overview-subtitle-en.srt (12.0 KB)
- 013 Maltego Overview.mp4 (16.6 MB)
- 014 Discovering Domain Info & Emails Associated With Target-subtitle-en.srt (9.9 KB)
- 014 Discovering Domain Info & Emails Associated With Target.mp4 (12.7 MB)
- 015 Discovering Information About Hosting Company_ Support Team Emails & Admin Email-subtitle-en.srt (8.7 KB)
- 015 Discovering Information About Hosting Company_ Support Team Emails & Admin Email.mp4 (14.1 MB)
- 016 Discovering Files_ Links_ Websites & Other Companies Related To Target-subtitle-en.srt (6.2 KB)
- 016 Discovering Files_ Links_ Websites & Other Companies Related To Target.mp4 (13.5 MB)
- 017 Using The Gathered Info To Build An Attack Strategy-subtitle-en.srt (5.9 KB)
- 017 Using The Gathered Info To Build An Attack Strategy.mp4 (9.1 MB)
- external_links.txt (0.1 KB)
- 018 Discovering Websites_ Links & Social Networking Accounts-subtitle-en.srt (13.6 KB)
- 018 Discovering Websites_ Links & Social Networking Accounts.mp4 (22.5 MB)
- 019 Discovering Twitter Friends & Associated Accounts-subtitle-en.srt (6.6 KB)
- 019 Discovering Twitter Friends & Associated Accounts.mp4 (9.3 MB)
- 020 Discovering Emails Of The Target's Friends-subtitle-en.srt (5.9 KB)
- 020 Discovering Emails Of The Target's Friends.mp4 (9.0 MB)
- 021 Analysing The Gathered Info & Building An Attack Strategy-subtitle-en.srt (11.9 KB)
- 021 Analysing The Gathered Info & Building An Attack Strategy.mp4 (21.1 MB)
- 022 Introduction-subtitle-en.srt (2.8 KB)
- 022 Introduction.mp4 (5.1 MB)
- 023 Installing Veil 3_0-subtitle-en.srt (9.9 KB)
- 023 Installing Veil 3_0.mp4 (15.3 MB)
- 024 Veil Overview & Payloads Basics-subtitle-en.srt (10.4 KB)
- 024 Veil Overview & Payloads Basics.mp4 (11.5 MB)
- 025 Generating An Undetectable Backdoor Using Veil 3-subtitle-en.srt (12.9 KB)
- 025 Generating An Undetectable Backdoor Using Veil 3.mp4 (20.8 MB)
- 026 Listening For Incoming Connections-subtitle-en.srt (9.6 KB)
- 026 Listening For Incoming Connections.mp4 (12.7 MB)
- 027 Hacking A Windows 10 Machine Using The Generated Backdoor-subtitle-en.srt (9.3 KB)
- 027 Hacking A Windows 10 Machine Using The Generated Backdoor.mp4 (16.0 MB)
- 028 Installing The Fat Rat-subtitle-en.srt (8.7 KB)
- 028 Installing The Fat Rat.mp4 (13.6 MB)
- 029 Generating An Undetectable Backdoor Using TheFatRat-subtitle-en.srt (15.1 KB)
- 029 Generating An Undetectable Backdoor Using TheFatRat.mp4 (27.0 MB)
- 030 Installing Empire-subtitle-en.srt (5.7 KB)
- 030 Installing Empire.mp4 (12.6 MB)
- 031 Creating An Empire Listener-subtitle-en.srt (7.5 KB)
- 031 Creating An Empire Listener.mp4 (12.2 MB)
- 032 Creating a Windows Powershell Stager & Hacking Windows 10-subtitle-en.srt (8.3 KB)
- 032 Creating a Windows Powershell Stager & Hacking Windows 10.mp4 (16.2 MB)
- 033 Modifying Backdoor Source To Bypass All Anti-virus Programs-subtitle-en.srt (10.9 KB)
- 033 Modifying Backdoor Source To Bypass All Anti-virus Programs.mp4 (14.0 MB)
- external_links.txt (0.2 KB)
- 034 What Is A Keylogger _-subtitle-en.srt (8.9 KB)
- 034 What Is A Keylogger _.mp4 (15.6 MB)
- 035 Creating A Remote Keylogger-subtitle-en.srt (6.1 KB)
- 035 Creating A Remote Keylogger.mp4 (11.1 MB)
- 036 Using A Remote Keylogger To Capture Key Strikes Including Passwords-subtitle-en.srt (9.7 KB)
- 036 Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 (17.3 MB)
- 037 Password Recovery Basics-subtitle-en.srt (10.4 KB)
- 037 Password Recovery Basics.mp4 (21.9 MB)
- 038 Recovering Saved Passwords From Local Machine-subtitle-en.srt (4.3 KB)
- 038 Recovering Saved Passwords From Local Machine.mp4 (8.2 MB)
- 039 Recovering Saved Passwords From A Remote Machine-subtitle-en.srt (15.7 KB)
- 039 Recovering Saved Passwords From A Remote Machine.mp4 (24.6 MB)
- 039 run-laZagne.txt (0.8 KB)
- external_links.txt (0.1 KB)
- 040 Bypassing All Anti-Virus Programs By Modifying Hex Vales-subtitle-en.srt (13.5 KB)
- 040 Bypassing All Anti-Virus Programs By Modifying Hex Vales.mp4 (22.3 MB)
- 041 Download & Execute Payload-subtitle-en.srt (9.2 KB)
- 041 Download & Execute Payload.mp4 (14.9 MB)
- 041 download-and-execute.txt (0.2 KB)
- 042 Creating The Perfect Spying Tool-subtitle-en.srt (9.1 KB)
- 042 Creating The Perfect Spying Tool.mp4 (18.8 MB)
- 043 Embedding Evil Files With Any File Type Like An Image Or PDF-subtitle-en.srt (13.6 KB)
- 043 Embedding Evil Files With Any File Type Like An Image Or PDF.mp4 (21.1 MB)
- 044 Running Evil Files Silently In The Background-subtitle-en.srt (12.0 KB)
- 044 Running Evil Files Silently In The Background.mp4 (23.5 MB)
- 045 Changing Trojan's Icon-subtitle-en.srt (10.2 KB)
- 045 Changing Trojan's Icon.mp4 (22.4 MB)
- 046 Spoofing File Extension from _exe to anything else (pdf_ png __etc)-subtitle-en.srt (14.9 KB)
- 046 Spoofing File Extension from _exe to anything else (pdf_ png __etc).mp4 (23.7 MB)
- 047 Download & Execute Payload (Method 2)-subtitle-en.srt (8.4 KB)
- 047 Download & Execute Payload (Method 2).mp4 (18.9 MB)
- 047 autoit-download-and-execute.txt (0.5 KB)
- 048 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2)-subtitle-en.srt (9.0 KB)
- 048 Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2).mp4 (18.3 MB)
- 049 Embedding backdoor In A Legitimate Microsoft Office Document-subtitle-en.srt (10.6 KB)
- 049 Embedding backdoor In A Legitimate Microsoft Office Document.mp4 (18.8 MB)
- 050 Embedding Any Evil File In A Legitimate Microsoft Office Document-subtitle-en.srt (12.5 KB)
- 050 Embedding Any Evil File In A Legitimate Microsoft Office Document.mp4 (20.9 MB)
- 050 download-and-execute-macro.txt (0.5 KB)
- external_links.txt (0.1 KB)
- 051 Introduction-subtitle-en.srt (3.8 KB)
- 051 Introduction.mp4 (11.3 MB)
- 052 Hacking Mac OS X Using A Meterpreter Backdoor-subtitle-en.srt (15.2 KB)
- 052 Hacking Mac OS X Using A Meterpreter Backdoor.mp4 (34.6 MB)
- 053 Hacking Mac OS X Using An Empire Stager-subtitle-en.srt (8.9 KB)
- 053 Hacking Mac OS X Using An Empire Stager.mp4 (14.3 MB)
- 054 Converting Basic Backdoor To An Executable-subtitle-en.srt (4.6 KB)
- 054 Converting Basic Backdoor To An Executable.mp4 (8.4 MB)
- 055 Embedding A Normal File With Backdoor-subtitle-en.srt (12.5 KB)
- 055 Embedding A Normal File With Backdoor.mp4 (26.7 MB)
- 056 Download & Execute Payload-subtitle-en.srt (9.4 KB)
- 056 Download & Execute Payload.mp4 (20.2 MB)
- 057 Changing Trojan's Icon-subtitle-en.srt (8.2 KB)
- 057 Changing Trojan's Icon.mp4 (20.2 MB)
- 058 Configuring The Trojan To Run Silently-subtitle-en.srt (7.9 KB)
- 058 Configuring The Trojan To Run Silently.mp4 (17.1 MB)
- 059 Embedding Backdoor In A Legitimate Microsoft Office Document-subtitle-en.srt (7.8 KB)
- 059 Embedding Backdoor In A Legitimate Microsoft Office Document.mp4 (13.9 MB)
- 060 Hacking Into Linux-Like Systems Using One Command-subtitle-en.srt (11.4 KB)
- 060 Hacking Into Linux-Like Systems Using One Command.mp4 (16.7 MB)
- 061 More Advanced Linux Backdoor-subtitle-en.srt (8.2 KB)
- 061 More Advanced Linux Backdoor.mp4 (10.2 MB)
- 062 Generating A Persistent Remote Keylogger-subtitle-en.srt (6.1 KB)
- 062 Generating A Persistent Remote Keylogger.mp4 (7.9 MB)
- 063 Using A Remote Keylogger To Capture Key Strikes Including Passwords-subtitle-en.srt (8.4 KB)
- 063 Using A Remote Keylogger To Capture Key Strikes Including Passwords.mp4 (13.7 MB)
- 064 Recovering Saved Passwords From A Local Machine-subtitle-en.srt (9.5 KB)
- 064 Recovering Saved Passwords From A Local Machine.mp4 (15.6 MB)
- 065 Execute & Report Payload-subtitle-en.srt (9.6 KB)
- 065 Execute & Report Payload.mp4 (11.7 MB)
- 065 ZReporter.py (0.4 KB)
- 066 Recovering Saved Passwords From A Remote Machine-subtitle-en.srt (8.7 KB)
- 066 Recovering Saved Passwords From A Remote Machine.mp4 (15.9 MB)
- 067 Embedding Evil Code In A Legitimate Linux Package - Part 1-subtitle-en.srt (17.5 KB)
- 067 Embedding Evil Code In A Legitimate Linux Package - Part 1.mp4 (19.2 MB)
- 068 Embedding Evil Code In A Legitimate Linux Package - Part 2-subtitle-en.srt (6.8 KB)
- 068 Embedding Evil Code In A Legitimate Linux Package - Part 2.mp4 (11.9 MB)
- 069 Backdooring a Legitimate Android App-subtitle-en.srt (13.1 KB)
- 069 Backdooring a Legitimate Android App.mp4 (18.3 MB)
- external_links.txt (0.2 KB)
- 070 Introduction-subtitle-en.srt (2.6 KB)
- 070 Introduction.mp4 (6.2 MB)
- 071 Preparing Evil Files To Be Delivered Via A URL-subtitle-en.srt (9.0 KB)
- 071 Preparing Evil Files To Be Delivered Via A URL.mp4 (11.0 MB)
- 072 Email Spoofing - Send Emails As Any Email Account-subtitle-en.srt (10.4 KB)
- 072 Email Spoofing - Send Emails As Any Email Account.mp4 (19.4 MB)
- 073 Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files-subtitle-en.srt (14.1 KB)
- 073 Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files.mp4 (25.3 MB)
- 074 Creating A Replica Of Any Website _ Login Page-subtitle-en.srt (7.9 KB)
- 074 Creating A Replica Of Any Website _ Login Page.mp4 (9.0 MB)
- 075 Stealing Login Info Using Fake A Login Page-subtitle-en.srt (11.7 KB)
- 075 Stealing Login Info Using Fake A Login Page.mp4 (17.6 MB)
- 076 BeEF Overview & Basic Hook Method-subtitle-en.srt (9.2 KB)
- 076 BeEF Overview & Basic Hook Method.mp4 (13.8 MB)
- 077 Injecting BeEF's Hook In Any Webpage-subtitle-en.srt (6.4 KB)
- 077 Injecting BeEF's Hook In Any Webpage.mp4 (11.3 MB)
- 078 Luring Target Into Accessing Evil URL Without Direct Interaction-subtitle-en.srt (14.3 KB)
- 078 Luring Target Into Accessing Evil URL Without Direct Interaction.mp4 (20.9 MB)
- 079 Basic BeEF Commands-subtitle-en.srt (6.0 KB)
- 079 Basic BeEF Commands.mp4 (11.6 MB)
- 080 Stealing Credentials_Passwords Using A Fake Login Prompt-subtitle-en.srt (3.1 KB)
- 080 Stealing Credentials_Passwords Using A Fake Login Prompt.mp4 (5.9 MB)
- 081 Hacking Windows 10 Using A Fake Update-subtitle-en.srt (6.4 KB)
- 081 Hacking Windows 10 Using A Fake Update.mp4 (8.9 MB)
- 082 Hacking Mac OS X Using A Fake Update-subtitle-en.srt (5.5 KB)
- 082 Hacking Mac OS X Using A Fake Update.mp4 (11.0 MB)
- 083 Hacking Linux Using A Fake Update-subtitle-en.srt (6.1 KB)
- 083 Hacking Linux Using A Fake Update.mp4 (8.9 MB)
- external_links.txt (0.2 KB)
- 084 Overview of the Setup-subtitle-en.srt (8.7 KB)
- 084 Overview of the Setup.mp4 (15.0 MB)
- 085 Ex1 - Generating a Backdoor That Works Outside The Network-subtitle-en.srt (7.3 KB)
- 085 Ex1 - Generating a Backdoor That Works Outside The Network.mp4 (13.2 MB)
- 086 Configuring The Router To Forward Connections To Kali-subtitle-en.srt (9.5 KB)
- 086 Configuring The Router To Forward Connections To Kali.mp4 (15.3 MB)
- 087 Ex2 - Using BeEF Outside The Network-subtitle-en.srt (7.3 KB)
- 087 Ex2 - Using BeEF Outside The Network.mp4 (15.5 MB)
- 088 Introduction-subtitle-en.srt (3.3 KB)
- 088 Introduction.mp4 (7.2 MB)
- 089 Upgrading Basic Shell Access To A Meterpreter_Empire Access-subtitle-en.srt (12.7 KB)
- 089 Upgrading Basic Shell Access To A Meterpreter_Empire Access.mp4 (12.5 MB)
- 090 Meterpreter Basics-subtitle-en.srt (8.1 KB)
- 090 Meterpreter Basics.mp4 (15.4 MB)
- 091 File System Commands-subtitle-en.srt (5.6 KB)
- 091 File System Commands.mp4 (13.0 MB)
- 092 Maintaining Access Basic Methods-subtitle-en.srt (6.8 KB)
- 092 Maintaining Access Basic Methods.mp4 (13.0 MB)
- 093 Maintaining Access - Using a Reliable & undetectable Method-subtitle-en.srt (8.3 KB)
- 093 Maintaining Access - Using a Reliable & undetectable Method.mp4 (18.7 MB)
- 094 Spying - Capturing Key Strikes & Taking Screen Shots-subtitle-en.srt (3.5 KB)
- 094 Spying - Capturing Key Strikes & Taking Screen Shots.mp4 (4.3 MB)
- 095 Pivoting - Theory (What is Pivoting_)-subtitle-en.srt (8.0 KB)
- 095 Pivoting - Theory (What is Pivoting_).mp4 (21.8 MB)
- 096 Pivoting - Exploiting Devices on The Same Network As The Target Computer-subtitle-en.srt (10.0 KB)
- 096 Pivoting - Exploiting Devices on The Same Network As The Target Computer.mp4 (19.7 MB)
- 097 Controlling Android Phone & Accessing Mic_ Camera_ Messages_ File System & More-subtitle-en.srt (12.2 KB)
- 097 Controlling Android Phone & Accessing Mic_ Camera_ Messages_ File System & More.mp4 (16.4 MB)
- 098 Maintaining Access On OS X-subtitle-en.srt (13.4 KB)
- 098 Maintaining Access On OS X.mp4 (23.0 MB)
- 099 Basics Of Empire Agents-subtitle-en.srt (8.7 KB)
- 099 Basics Of Empire Agents.mp4 (12.5 MB)
- 100 File System Commands-subtitle-en.srt (8.7 KB)
- 100 File System Commands.mp4 (12.4 MB)
- 101 Upload & Execute Shell Commands-subtitle-en.srt (5.8 KB)
- 101 Upload & Execute Shell Commands.mp4 (9.7 MB)
- 102 Injecting Backdoor Process In System Processes-subtitle-en.srt (12.3 KB)
- 102 Injecting Backdoor Process In System Processes.mp4 (21.9 MB)
- 103 Stealing root Password & Escalating Privileges On OS X-subtitle-en.srt (9.7 KB)
- 103 Stealing root Password & Escalating Privileges On OS X.mp4 (14.7 MB)
- 104 Maintaining Access On OS X-subtitle-en.srt (7.1 KB)
- 104 Maintaining Access On OS X.mp4 (13.6 MB)
- 105 Detecting Fake_Spoofed Emails-subtitle-en.srt (9.0 KB)
- 105 Detecting Fake_Spoofed Emails.mp4 (11.3 MB)
- 106 How to Protect Against BeEF & Other Browser Exploits-subtitle-en.srt (5.3 KB)
- 106 How to Protect Against BeEF & Other Browser Exploits.mp4 (10.8 MB)
- 107 Detecting Trojans Manually-subtitle-en.srt (6.7 KB)
- 107 Detecting Trojans Manually.mp4 (11.2 MB)
- 108 Detecting Trojans Using a Sandbox-subtitle-en.srt (4.1 KB)
- 108 Detecting Trojans Using a Sandbox.mp4 (7.6 MB)
- external_links.txt (0.1 KB)
- 109 Bonus Lecture - What's Next_.html (4.6 KB)
- [FreeCourseSite.com].txt (1.1 KB)
- [FreeCourseSite.com].url (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://62.138.0.158:6969/announce
- udp://87.233.192.220:6969/announce
- udp://111.6.78.96:6969/announce
- udp://90.179.64.91:1337/announce
- udp://51.15.4.13:1337/announce
- udp://151.80.120.113:2710/announce
- udp://191.96.249.23:6969/announce
- udp://35.187.36.248:1337/announce
- udp://82.45.40.204:1337/announce
- udp://123.249.16.65:2710/announce
- udp://127.0.0.1:6969/announce
- udp://210.244.71.25:6969/announce
- udp://78.142.19.42:1337/announce
- udp://173.254.219.72:6969/announce
- udp://51.15.76.199:6969/announce
- udp://91.212.150.191:3418/announce
- udp://103.224.212.222:6969/announce
- udp://92.241.171.245:6969/announce
- udp://51.15.40.114:80/announce
- udp://5.79.83.194:6969/announce