وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Learn Ethical Hacking Using The Cloud From Scratch

سرفصل های دوره

Use the cloud to hack online accounts, computers, browsers and much more | No prior knowledge required


1. Introduction to Cloud Computing For Hackers
  • 1. Teaser
  • 2. Introduction to Hacking Using the Cloud
  • 3. What is The Cloud
  • 4. Why Learn Cloud Computing as a Hacker

  • 2. Cloud Basics
  • 1. Introduction to Cloud Basics
  • 2. Signing Up With AWS
  • 3. Installing Kali Linux On The Cloud
  • 4. Communicating With Cloud Computers Remotely Using SSH
  • 5. Linux Terminal Basics

  • 3. Phishing
  • 1. Introduction to Phishing
  • 2. File Hosting & Firewall Settings
  • 3. Cloning Websites & Uploading Them to The Cloud
  • 4. Creating a Fake Login Page On The Cloud
  • 5. Modifying the Page to Steal Login Information
  • 6. Stealing Facebook Login Using an Identical Fake Login Page
  • 7. Domain Name & DNS Basics
  • 8. Linking Domain Names to Phishing Pages
  • 9. Introduction to HTTPS
  • 10. Enabling HTTPS on Phishing Pages

  • 4. Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)
  • 1. Introduction to Evilginx
  • 2. Installing Evilginx on the Cloud
  • 3. Bypassing 2FA MFA

  • 5. Accessing Cloud Server Desktop
  • 1. Introduction and Main Setup
  • 2. Accessing The Desktop of Cloud Servers

  • 6. BitB - Browser In Browser Attack
  • 1. Introduction to Browser in Browser Attack
  • 2. Polishing the Connection & Installing a Browser
  • 3. Building a Malicious Browser
  • 4. Enhancing the URL
  • 5. Hacking Gmail & Bypassing 2FA MFA
  • 6. Hacking Whatsapp

  • 7. Mobile BitB - Mobile Friendly Phishing & 2FA Bypass
  • 1. Mobile Friendly Phishing Pages
  • 2. Hiding the Cursor
  • 3. Installing & Configuring a Virtual Keyboard
  • 4. Hacking Gmail on Mobile Devices & Bypassing 2FA

  • 8. Multi-BitB Attack
  • 1. Establishing Multiple Independent Connections
  • 2. Creating Independent User Sessions
  • 3. Stealing Gmail & Facebook Logins From Multiple Devices

  • 9. Hacking Web Browsers
  • 1. Introduction to Browser Hacking
  • 2. Installing Needed Software
  • 3. Embedding Evil Code in Cloned Websites
  • 4. Enabling HTTPS on Malicous Pages
  • 5. Windows & Apple Mac OS Web Browser Hacking
  • 6. Programming Custom Evil Pages to Access the Targets Location & OS
  • 7. Automatically Storing Gathered Information on the Cloud
  • 8. URL Manipulation

  • 10. Command & Control Servers (C2 C&C)
  • 1. Introduction to Command & Control Servers
  • 2. What is a C2 & Which is the best

  • 11. Hacking Windows, Linux & Apple Mac OS From the Cloud
  • 1. Introduction to Empire & Starkiller
  • 2. Interacting with Starkiller
  • 3. Receiving Backdoor Connections From the Cloud
  • 4. Creating a Windows Backdoor Using Starkiller
  • 5. Hacking & Controlling Windows 11 Through the Cloud

  • 12. Post Exploitation With StarKiller
  • 1. File System Access & System Command Execution
  • 2. StarKiller Modules Basics
  • 3. Finding Sensitive Data on Windows & Module Filtering
  • 4. Stealing Windows Passwords
  • 5. Capturing Keystrikes & Copied Passwords
  • 6. Launching a Ransomeware Attack

  • 13. Hacking Windows Using Discord as a C2
  • 1. Introduction & Setup
  • 2. Creating a Discord Server
  • 3. Weaponising Discord Servers
  • 4. Hacking Windows 11 Through Discord

  • 14. Windows Post Exploitation via Discord
  • 1. Getting Computer info, Location & Stored Passwords
  • 2. Remotely Executing System Commands & Getting a Reverse Shell
  • 3. Remote File System Management With Upload & Download
  • 4. Remote Webcam & Keyboard Access

  • 15. Creating Windows Trojans
  • 1. Introduction to Trojans
  • 2. Creating a Basic Trojan
  • 3. Improving Torjans Icon & Behaviour

  • 16. Creating Apple Mac OS & Linux Trojans
  • 1. Generating a Basic Apple and Linux Backdoor
  • 2. Hacking Apple Mac OS Using a Trojan
  • 3. Hacking Linux Using a Trojan

  • 17. Advanced Malware Delivery
  • 1. Introduction to Advanced Delivery Methods
  • 2. Introduction to self-hosting + Demo
  • 3. Installing a File Sharing Service on The Cloud
  • 4. Manipulating Shared Files on The Cloud
  • 5. Hiding Replacing File Type & Extension
  • 6. Manually Enabling HTTPS
  • 7. Cross-Platform Malware Delivery

  • 18. Bonus Section
  • 1. Bonus Lecture.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 37370
    حجم: 7094 مگابایت
    مدت زمان: 527 دقیقه
    تاریخ انتشار: 20 خرداد 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید