وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Learn Ethical Hacking Using The Cloud From Scratch

سرفصل های دوره

Use the cloud to hack online accounts, computers, browsers and much more | No prior knowledge required


1. Introduction to Cloud Computing For Hackers
  • 1. Teaser
  • 2. Introduction to Hacking Using the Cloud
  • 3. What is The Cloud
  • 4. Why Learn Cloud Computing as a Hacker

  • 2. Cloud Basics
  • 1. Introduction to Cloud Basics
  • 2. Signing Up With AWS
  • 3. Installing Kali Linux On The Cloud
  • 4. Communicating With Cloud Computers Remotely Using SSH
  • 5. Linux Terminal Basics

  • 3. Phishing
  • 1. Introduction to Phishing
  • 2. File Hosting & Firewall Settings
  • 3. Cloning Websites & Uploading Them to The Cloud
  • 4. Creating a Fake Login Page On The Cloud
  • 5. Modifying the Page to Steal Login Information
  • 6. Stealing Facebook Login Using an Identical Fake Login Page
  • 7. Domain Name & DNS Basics
  • 8. Linking Domain Names to Phishing Pages
  • 9. Introduction to HTTPS
  • 10. Enabling HTTPS on Phishing Pages

  • 4. Phishing - Bypassing 2 Multi Factor Authentication (2FA MFA)
  • 1. Introduction to Evilginx
  • 2. Installing Evilginx on the Cloud
  • 3. Bypassing 2FA MFA

  • 5. Accessing Cloud Server Desktop
  • 1. Introduction and Main Setup
  • 2. Accessing The Desktop of Cloud Servers

  • 6. BitB - Browser In Browser Attack
  • 1. Introduction to Browser in Browser Attack
  • 2. Polishing the Connection & Installing a Browser
  • 3. Building a Malicious Browser
  • 4. Enhancing the URL
  • 5. Hacking Gmail & Bypassing 2FA MFA
  • 6. Hacking Whatsapp

  • 7. Mobile BitB - Mobile Friendly Phishing & 2FA Bypass
  • 1. Mobile Friendly Phishing Pages
  • 2. Hiding the Cursor
  • 3. Installing & Configuring a Virtual Keyboard
  • 4. Hacking Gmail on Mobile Devices & Bypassing 2FA

  • 8. Multi-BitB Attack
  • 1. Establishing Multiple Independent Connections
  • 2. Creating Independent User Sessions
  • 3. Stealing Gmail & Facebook Logins From Multiple Devices

  • 9. Hacking Web Browsers
  • 1. Introduction to Browser Hacking
  • 2. Installing Needed Software
  • 3. Embedding Evil Code in Cloned Websites
  • 4. Enabling HTTPS on Malicous Pages
  • 5. Windows & Apple Mac OS Web Browser Hacking
  • 6. Programming Custom Evil Pages to Access the Targets Location & OS
  • 7. Automatically Storing Gathered Information on the Cloud
  • 8. URL Manipulation

  • 10. Command & Control Servers (C2 C&C)
  • 1. Introduction to Command & Control Servers
  • 2. What is a C2 & Which is the best

  • 11. Hacking Windows, Linux & Apple Mac OS From the Cloud
  • 1. Introduction to Empire & Starkiller
  • 2. Interacting with Starkiller
  • 3. Receiving Backdoor Connections From the Cloud
  • 4. Creating a Windows Backdoor Using Starkiller
  • 5. Hacking & Controlling Windows 11 Through the Cloud

  • 12. Post Exploitation With StarKiller
  • 1. File System Access & System Command Execution
  • 2. StarKiller Modules Basics
  • 3. Finding Sensitive Data on Windows & Module Filtering
  • 4. Stealing Windows Passwords
  • 5. Capturing Keystrikes & Copied Passwords
  • 6. Launching a Ransomeware Attack

  • 13. Hacking Windows Using Discord as a C2
  • 1. Introduction & Setup
  • 2. Creating a Discord Server
  • 3. Weaponising Discord Servers
  • 4. Hacking Windows 11 Through Discord

  • 14. Windows Post Exploitation via Discord
  • 1. Getting Computer info, Location & Stored Passwords
  • 2. Remotely Executing System Commands & Getting a Reverse Shell
  • 3. Remote File System Management With Upload & Download
  • 4. Remote Webcam & Keyboard Access

  • 15. Creating Windows Trojans
  • 1. Introduction to Trojans
  • 2. Creating a Basic Trojan
  • 3. Improving Torjans Icon & Behaviour

  • 16. Creating Apple Mac OS & Linux Trojans
  • 1. Generating a Basic Apple and Linux Backdoor
  • 2. Hacking Apple Mac OS Using a Trojan
  • 3. Hacking Linux Using a Trojan

  • 17. Advanced Malware Delivery
  • 1. Introduction to Advanced Delivery Methods
  • 2. Introduction to self-hosting + Demo
  • 3. Installing a File Sharing Service on The Cloud
  • 4. Manipulating Shared Files on The Cloud
  • 5. Hiding Replacing File Type & Extension
  • 6. Manually Enabling HTTPS
  • 7. Cross-Platform Malware Delivery

  • 18. Bonus Section
  • 1. Bonus Lecture.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 37370
    حجم: 7094 مگابایت
    مدت زمان: 527 دقیقه
    تاریخ انتشار: ۲۰ خرداد ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید