وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Phishing Mastery: Social-Engineering Hacking Masterclass

سرفصل های دوره

Master Phishing Attacks - Learn real hacking and how to bypass all MFA security


1 - Introduction and Course Overview
  • 1 - Course Introduction and Welcome
  • 1 - Course-Welcome-Letter.docx
  • 2 - Important Legal and Ethical Disclaimer.html
  • 3 - Defining what a Hacker is in Modern Times
  • 4 - A Brief History of Cyber Attacks

  • 2 - Phishing User Security Passwords and MFA Fundamentals
  • 5 - The Evolution of Online Security Passwords and Authentication
  • 6 - Deep Dive Analysis of MultiFactor Authentication.html
  • 6 - unnamed.zip
  • 7 - Case Study The LinkedIn Phishing Attack
  • 8 - Online Security 101 Passwords 2FA Authentication and Modern Attacking Tools
  • 9 - A DeepDive into MITM ManintheMiddle Phishing Attacks
  • 10 - Modern Amazon Phishing Attack Demo

  • 3 - Introduction to Evilginx
  • 11 - Introduction to Evilginx3 and Unveiling Its Beginnings with Creator Kuba Gretzky
  • 12 - Evilginx and EvilProxy Context Resource Popular Cyber Attacks.html
  • 13 - Evilginx Compared to Other Phishing Tool Kits Explained.html
  • 14 - Rencora Phishlet Example Code Resource.html

  • 4 - Setting Up Your Environment
  • 15 - Cookie Editor Extension.txt
  • 15 - Domain.txt
  • 15 - Infrastructure Setup
  • 15 - VPS.txt
  • 16 - Connecting our Domain to Evilginx VPS Server

  • 5 - Session Tokens Authentication Keys and Cookies Explained
  • 17 - Introduction to Cookies.html
  • 18 - What are Session Tokens Authentication Keys and Cookies

  • 6 - Setting Up and Deploying Evilginx3
  • 19 - Setting Up and Connecting Your Domain to the Evilginx VPS Server
  • 20 - Installing Evilginx3
  • 20 - STEP-1.Go-Installation-Resource-Code.docx
  • 20 - STEP-2.Evilginx-Installation.docx

  • 7 - Staging Our First Engagement with Evilginx3
  • 21 - Introducing Phishlets
  • 22 - DemoPhishlet.txt
  • 22 - Setting Up our First Engagement with Evilginx3 and Creating First Phishlet File
  • 23 - Configure Domain and Generating Phishing Lure
  • 24 - How to Use Evilginx3 to Bypass Modern MultiFactor Authentication
  • 25 - Catching Phish with Evilginx3 Full Walkthrough
  • 26 - Catching More Phish with Evilginx3 Walkthrough 2

  • 8 - Best Practices for Post Engagements
  • 27 - Reviewing the Attack Engagement.html
  • 28 - PostEngagement Best Practices
  • 29 - PostEngagement Cleanup Domain Settings etc

  • 9 - Defensive Section Protecting Against Evilginx Similar Cyber Attacks
  • 30 - Essential Cybersecurity Defensive Checklist
  • 31 - Closing Evilginx Ending the Attack Simulation
  • 32 - Safeguarding and Protecting 3rd Party Applications
  • 33 - Effective Strategies for Strengthening Cybersecurity Defenses Moving Forward

  • 10 - Course Wrapup Review and Final Assessment
  • 34 - Course Conclusion
  • 35 - Future Courses and Lessons.html

  • 11 - Using Evilginx2 on Githubs Demo Protocol and Enterprise Checklist Review
  • 36 - Bypassing Github Authentication with Evilginx2 Spear Phishing Demonstration 3
  • 37 - Security Campaign Management Client Review Checklist.html
  • 37 - Security-Post-Engagement-Client-Questionnaire.docx
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 37430
    حجم: 1402 مگابایت
    مدت زمان: 127 دقیقه
    تاریخ انتشار: 20 خرداد 1403
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید