وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
1

Phishing Mastery: Social-Engineering Hacking Masterclass

سرفصل های دوره

Master Phishing Attacks - Learn real hacking and how to bypass all MFA security


1 - Introduction and Course Overview
  • 1 - Course Introduction and Welcome
  • 1 - Course-Welcome-Letter.docx
  • 2 - Important Legal and Ethical Disclaimer.html
  • 3 - Defining what a Hacker is in Modern Times
  • 4 - A Brief History of Cyber Attacks

  • 2 - Phishing User Security Passwords and MFA Fundamentals
  • 5 - The Evolution of Online Security Passwords and Authentication
  • 6 - Deep Dive Analysis of MultiFactor Authentication.html
  • 6 - unnamed.zip
  • 7 - Case Study The LinkedIn Phishing Attack
  • 8 - Online Security 101 Passwords 2FA Authentication and Modern Attacking Tools
  • 9 - A DeepDive into MITM ManintheMiddle Phishing Attacks
  • 10 - Modern Amazon Phishing Attack Demo

  • 3 - Introduction to Evilginx
  • 11 - Introduction to Evilginx3 and Unveiling Its Beginnings with Creator Kuba Gretzky
  • 12 - Evilginx and EvilProxy Context Resource Popular Cyber Attacks.html
  • 13 - Evilginx Compared to Other Phishing Tool Kits Explained.html
  • 14 - Rencora Phishlet Example Code Resource.html

  • 4 - Setting Up Your Environment
  • 15 - Cookie Editor Extension.txt
  • 15 - Domain.txt
  • 15 - Infrastructure Setup
  • 15 - VPS.txt
  • 16 - Connecting our Domain to Evilginx VPS Server

  • 5 - Session Tokens Authentication Keys and Cookies Explained
  • 17 - Introduction to Cookies.html
  • 18 - What are Session Tokens Authentication Keys and Cookies

  • 6 - Setting Up and Deploying Evilginx3
  • 19 - Setting Up and Connecting Your Domain to the Evilginx VPS Server
  • 20 - Installing Evilginx3
  • 20 - STEP-1.Go-Installation-Resource-Code.docx
  • 20 - STEP-2.Evilginx-Installation.docx

  • 7 - Staging Our First Engagement with Evilginx3
  • 21 - Introducing Phishlets
  • 22 - DemoPhishlet.txt
  • 22 - Setting Up our First Engagement with Evilginx3 and Creating First Phishlet File
  • 23 - Configure Domain and Generating Phishing Lure
  • 24 - How to Use Evilginx3 to Bypass Modern MultiFactor Authentication
  • 25 - Catching Phish with Evilginx3 Full Walkthrough
  • 26 - Catching More Phish with Evilginx3 Walkthrough 2

  • 8 - Best Practices for Post Engagements
  • 27 - Reviewing the Attack Engagement.html
  • 28 - PostEngagement Best Practices
  • 29 - PostEngagement Cleanup Domain Settings etc

  • 9 - Defensive Section Protecting Against Evilginx Similar Cyber Attacks
  • 30 - Essential Cybersecurity Defensive Checklist
  • 31 - Closing Evilginx Ending the Attack Simulation
  • 32 - Safeguarding and Protecting 3rd Party Applications
  • 33 - Effective Strategies for Strengthening Cybersecurity Defenses Moving Forward

  • 10 - Course Wrapup Review and Final Assessment
  • 34 - Course Conclusion
  • 35 - Future Courses and Lessons.html

  • 11 - Using Evilginx2 on Githubs Demo Protocol and Enterprise Checklist Review
  • 36 - Bypassing Github Authentication with Evilginx2 Spear Phishing Demonstration 3
  • 37 - Security Campaign Management Client Review Checklist.html
  • 37 - Security-Post-Engagement-Client-Questionnaire.docx
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 37430
    حجم: 1402 مگابایت
    مدت زمان: 127 دقیقه
    تاریخ انتشار: ۲۰ خرداد ۱۴۰۳
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید