itsv
New member
- Aug 12, 2019
- 13
- 6
- 3
Complete Guide to systems, phones and Facebook hacking with Kali Linux, using client exploitation techniques.
official course link : https://www.udemy.com/course/advanced-real-world-hacking-with-practical-videos
Topics covered:
Requirements
Enjoy!
official course link : https://www.udemy.com/course/advanced-real-world-hacking-with-practical-videos
Topics covered:
- What Is Ethical Hacking And Penetration Testing, And How Can You Use It
- Introduction From Your Co-Instructor Snehil Khare about Ethical Hacking
- Environment setup lecture
- Stealing facebook credentials via phishing
- How to defend against phishing attacks
- User Browser hacking using Beef exploitation framework
- How to defend against browser attacks
- User machine hacking via word and excel documents
- Hacking android phones for fun and profit
- Backdooring android apps for Profit
- How to defend against android attacks
- Chaining multiple commands together
- Download and build the target
- Hacking with Kali Linux your target system
Requirements
- Reliable and fast internet connection
- Basic understanding of what social engineering attacks are
- A touch up on phishing, java drive by , backdoors, keyloggers.
- Windows machine with 4-8 GB RAM , Virtualization software
Enjoy!