• LOGIN
  • No products in the cart.

Complete Guide to systems, phones and Facebook hacking with Kali Linux, using client exploitation techniques.

What you’ll learn
  • Step by step instructions for installation of VirtualBox and creating your virtual environment on Windows
  • Stealing social networking sites (facebook,twitter) user password via automated phishing attack.

  • Hacking users browser remotely for key-logging , machine compromise and other attacks.

  • Hacking user machine via word and excel documents
  • Hacking victims phone and backdooring android apps for fun and profit
  • Defending from all the above mentioned attacks
Requirements
  • Reliable and fast internet connection
  • Basic understanding of what social engineering attacks are
  • A touch up on phishing, java drive by , backdoors, keyloggers.
  • Windows machine with 4-8 GB RAM , Virtualization software

Here is what we will cover:

  • Phishing (Social network accounts such as Facebook, Twitter, etc.)
  • Browser attacks
  • Macro based client side hack
  • Android Phone hacking
  • Defend against all client side attacks

 

Who this course is for:
  • You can begin this course with no level of knowledge and quickly start learning new skills as an information technology and security expert anywhere in the world!
  • The course is truly for education and research purpose only
  • The course is designed to help learners understand the challenges and different mediums through which hacker’s target users on the internet
  • Students who wish to understand the technicalities involved in real world hacking scenarios are best suited
  • Students who wish to understand how visiting one single link or downloading a PDF file from internet can grant hackers access to their machine
  • Pro-users in client side exploitation can skip the course. In any case , the course is hands-on and easy to understand and can be understood with some amount of personal research and dedication.

Course content

 12 lectures 01:37:51
Creating your hacking environment with VirtualBox and Kali Linux.
08:43
Getting started using ethical hacking and penetration testing
01:22:59
Stealing facebook credentials via phishing attack
13:36
How to defend against phishing attacks
02:18
User Browser hacking using Beef exploitation framework
18:13
How to defend against browser attacks
02:49
User machine hacking via word and excel documents
10:58
How to defend against macro attacks
04:06
Backdooring android apps for fun and profit Part 2
12:42
How to defend against android attacks
02:35
Download This Course

 

X