Learn Social Engineering From Scratch 2024
- Descrição
- Currículo
- FAQ
- Revisões
Last Update: June 2024
Note: Although social engineering is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, how to hack more operating systems, advanced exploitation, advanced post exploitation, bypassing security and more!
Welcome to this comprehensive course on Social Engineering! This course assumes you have NO prior knowledge in hacking, it starts with you from scratch and takes you step-by-step to an advanced level. By the end of it you’ll be able to hack all major operating systems (windows, Apple Mac OS, Linux and Android) like black-hat hackers and secure yourself from hackers.
This course is highly practical but doesn’t neglect the theory, we’ll start with basics to teach you how to install the needed software (on Windows, Linux and Apple Mac OS). Then we’ll start hacking straight away, you’ll learn everything by example, no boring lectures! You will understand the theory behind every attack first and then you’ll learn how to use that attack in a practical real life scenario to hack Windows, Linux, Apple Mac OS and Android. So by the end of the course you’ll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.
The course is divided into a number of sections to represent the steps you’d take to successfully hack a target using social engineering.
1. Information Gathering – First you need to know your target, in this section you’ll learn how to gather information about your target whether it is a company, a website or just a person. You will learn how to discover anything that is associated with your target such as websites, links, companies, users, emails, phone numbers, friends, social networks accounts, etc. You will also learn how to plot all of this information on a graph and use it to build smart attack strategies.
2. Generating Malware – Now that you gathered enough information about your target and came up with an attack strategy, the next step is to create custom malware that is attractive to the target. This section will teach you how to create backdoors, keyloggers, credential harvesters and more, these files will work on all operating systems (Windows, Apple Mac OS, Linux and Android). You’ll also learn how to enhance these files to make them bypass all anti-virus programs, and make them look and function just like any other file such as an image or a pdf, or even embed them in legitimate Microsoft Office documents.
3. Delivery Methods – Now that you have your custom-made trojan ready, in this section you will learn a number of social engineering techniques to deliver it to the target, you will learn how to create fake websites that look identical to websites the target trusts, send emails that appear like they’re send from trusted sources and use fake login pages and fake updates to hack the target. You’ll also learn advanced social engineering techniques to lure the target to visit your malicious website without even interacting with them.
4. Post Exploitation – In this section you will learn how to interact with the systems you compromised whether they use Windows, Linux, Apple Mac OS or even Android. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, escalate your privileges, spy on the target, use the target computer as a pivot to hack other computers and more! If your target uses Android then you’ll also learn how to read their messages, find their location, access their other accounts (such as Whatsapp, Facebook, etc.) and more!
Finally at the end of the course you will learn how to protect yourself and your systems from these attacks.
With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.
Checkout the curriculum and the course teaser for more info!
Notes:
-
This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
-
This course is totally a product of Zaid Sabih & zSecurity, no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.
-
1Teaser - Hacking An Android Phone & Accessing The CameraVídeo Aula
This is a teaser lecture showing you an example of what you'll be able to do by the end of the course, don't worry about the technical aspect here, you will learn each step done here later on in the course, so just sit back and enjoy the lecture.
-
2Introduction to Social EngineeringVídeo Aula
This lecture will give you an brief intro of what social engineering is, why its used in hacking, and why learn it?
-
3Course OverviewVídeo Aula
This lecture will give you an overview of the whole course, its main sections, and what you'll learn in each of these sections.
-
4Update NoticeVídeo Aula
-
5Lab Overview & Needed SoftwareVídeo Aula
In this course, we will be using a number of operating systems, Kali for hacking and 2 others as victim or target machines, in this section you will learn how to install all of these machines as virtual machines inside your current operating system, this allow us to use all of the machines at the same time, it also completely isolates these machines from your main machine therefore your main machine will not be affected if anything goes wrong.
This lecture will give you an overview of the lab that we will need to set up for this course.
-
6Initial PreparationVídeo Aula
This lecture will introduce you to the hacking operating system that we will be using throughout the course; Kali Linux. You will learn what it is, how to download it, and how to enable virtualisation on your system to run it as a virtual machine.
-
7Installing Kali Linux as a VM on WindowsVídeo Aula
This lecture will teach you how to install Kali Linux as a virtual machine in VMware Workstation Player on Windows.
VMware is the software that we will use to install different operating systems inside our current operating system as virtual machines. This will be very useful as you can use it to test and practice what you learn in this course. -
8Installing Kali Linux as a VM on Apple Mac OS (Intel & Silicon Chips)Vídeo Aula
This lecture will teach you how to install Kali Linux as a virtual machine in VMware Fusion on Mac OS.
VMware is the software that we will use to install different operating systems inside our current operating system as virtual machines. This will be very useful as you can use it to test and practice what you learn in this course. -
9Installing Kali Linux as a VM on LinuxVídeo Aula
This lecture will teach you how to install Kali Linux as a virtual machine in VMware Workstation Player on Linux.
VMware is the software that we will use to install different operating systems inside our current operating system as virtual machines. This will be very useful as you can use it to test and practice what you learn in this course.
-
13Maltego OverviewVídeo Aula
Maltego is a great information gathering tool that we will use during this course, this lecture will give you an overview of this tool and its basic usage.
-
14Discovering Domain Info & Emails Associated With TargetVídeo Aula
In this lecture you will learn how to use Maltego to discover websites, domains, domain info and emails related to a company.
-
15Discovering Information About Hosting Company, Support Team Emails & Admin EmailVídeo Aula
In this lecture you will learn how to discover the hosting company used by the target, their contact info and more.
-
16Discovering Files, Links, Websites & Other Companies Related To TargetVídeo Aula
This lecture will build up on what you learned so far about Maltego, you will learn how to discover links, websites, files and other companies associated with your target company.
-
17Using The Gathered Info To Build An Attack StrategyVídeo Aula
Now that we are done gathering information about the target company, in this lecture we will analyse all the information we gathered so far and try to come up with attack strategies to hack into this company.
-
18Discovering Websites, Links & Social Networking AccountsVídeo Aula
In this lecture and the next few ones we will start a new graph and try to gather information about a person not a company or a website, so we will start with a name (Zaid Sabih) and try to discover websites, links and social accounts associated with our target.
-
19Discovering Twitter Friends & Associated AccountsVídeo Aula
In this lecture you will learn how to gather even more information about our target person, you will learn how to discover potential friends (emails and social network accounts) of people associated with the target person.
-
20Discovering Emails Of The Target's FriendsVídeo Aula
Finally in this lecture you will learn how to discover emails of the target's friends, these can be very useful later on as we can pretend to be one of these friends and social engineer the target into doing something that would allow us to hack into their system.
-
21Analysing The Gathered Info & Building An Attack StrategyVídeo Aula
In this lecture we will zoom out and look at the information that we gathered about the target person (Zaid Sabih) and analyse it to come up with a number of attack strategies.
-
22Introduction to Windows MalwareVídeo Aula
This lecture will give you an overview of the structure of this section and what you'll learn in it.
-
23Installing Windows As a Virtual MachineVídeo Aula
In this lecture you will learn how to set up a windows virtual machine so that we can try and hack into it to practice penetration testing.
-
24Installing Windows as a Virtual Machine on Apple Silicon ComputersVídeo Aula
-
25Backdoors and Payloads BasicsVídeo Aula
-
26Creating Your Own BackdoorVídeo Aula
-
27Listening for Backdoor ConnectionsVídeo Aula
-
28Hacking Windows 11 Using Your Own BackdoorVídeo Aula
-
29Introduction to The Fat RatVídeo Aula
The Fat Rat is yet another tool that can be used to generate undetectable backdoors, in this lecture you will learn how to install it on Kali Linux.
-
30Generating An Undetectable Backdoor For Windows - Method 2Vídeo Aula
In this lecture you will learn how to generate an undetectable backdoor using the fat rat and hack a Windows 10 machine with it.
-
31Introduction to EmpireVídeo Aula
Empire is a framework that can be used to generate backdoors for Windows, Linux, OS X and more, it uses a completely different approach to bypass anti-virus programs, this lecture will introduce you to this amazing framework and teach you how to install it on Kali Linux.
-
32Creating a Windows Powershell Stager & Hacking Windows 10Vídeo Aula
In this lecture you will learn how to use Empire to generate an undetectable backdoor and use it to hack a Windows 10 machine.
-
33Modifying Backdoor Source To Bypass All Anti-virus ProgramsVídeo Aula
In this lecture you will learn how to modify the source code used in Empire stagers to get it to bypass all anti-virus programs.
-
34Introduction to KeyloggersVídeo Aula
In this lecture you will learn what is a keylogger and how it can be useful.
You will also learn how to install a program called zLogger that can be used to generate remote keyloggers.
-
35Creating A Remote KeyloggerVídeo Aula
This lecture will teach you how to use zLogger to generate a remote keylogger.
-
36Using A Remote Keylogger To Capture Key Strikes Including PasswordsVídeo Aula
In this video you'll see the keylogger that we generated before in action, we will test it against a Windows 10 machine and you'll see how it records all key strikes and sends them to the email we picked.
-
37Password Recovery BasicsVídeo Aula
In this lecture we will have a look on a password recovery tool called LaZagne, this tool can recover saved passwords from Windows and Linux.
-
38Recovering Saved Passwords From Local MachineVídeo Aula
In this lecture you will learn how to use LaZagne to recover saved passwords from a local machine, this will only work if you already have access to the target machine.
-
39Recovering Saved Passwords From A Remote MachineVídeo Aula
In this lecture you will learn how to use LaZagne with a reporting payload to send stolen passwords to our email address.
-
40Bypassing All Anti-Virus Programs By Modifying Hex ValesVídeo Aula
In this lecture you will learn how to modify file's code to get it to bypass all anti-virus programs.
-
41Download & Execute PayloadVídeo Aula
In this lecture we will have a look on a very useful yet simple payload, this payload can be used to download and execute any number of files when executed.
-
42Creating The Perfect Spying ToolVídeo Aula
In this lecture you will learn how to use the download and execute payload to create a perfect spying tool that steals saved passwords and constantly logs and reports all keystrikes.
-
43Embedding Malware With Any File Type Like An Image Or PDFVídeo Aula
This lecture will teach you how to combine your backdoor with any other file (image, pdf ....etc).
This is the first step to convert our evil file to a trojan; an evil file that looks and functions like trusted file.
-
44Running Malware Silently In The BackgroundVídeo Aula
In this lecture you will learn how to enhance the trojan that we made in the previous lecture and make it run the evil code in the background without showing any suspicious pop ups.
-
45Changing Trojan's IconVídeo Aula
Now that we have an evil file that functions like a normal file, we need to make it look like a normal file too, the first step to achieve that is to change the icon to something that represents the file that we are trying to mimc.
-
46Spoofing File Extension from .exe to anything else (pdf, png, etc.)Vídeo Aula
The last step of making a perfect trojan is to spoof its extension so that it has an extension thats relevant to the icon and to the file that the target is expecting.
-
47Download & Execute Payload (Method 2)Vídeo Aula
In this lecture you will learn how to use another download and execute payload, the main advantage of this payload is the fact that you won't need to use any 3rd party software to convert it to exe, this is useful because sometimes some AV programs (usually not popular ones) flag ANY bat file converted to exe using these 3rd party programs as malware, this is obviously wrong and they usually do fix it after a while, but if you find yourself in a situation where your download and execute is getting detected then you can use this methods instead.
-
48Embedding Malware With Any File Type Like An Image Or PDF (Method 2)Vídeo Aula
This lecture will show you how to compile the payload we created in the previous lecture to exe and change its icon.
-
49Embedding a Backdoor in Microsoft Office DocumentVídeo Aula
In this lecture you will learn how to embed backdoor code in a legitimate Microsoft Office document, this is different to what you learned so far as we used to generate an exe that downloads and executes the backdoor in the background and display a normal file to the target, then we changed the icon and spoofed the extension to make the trojan look exactly like a normal file, in this method though we will inject the evil code inside the document, so the result is going to be a legitimate Microsoft Office file with a normal icon and a normal extension, but when executed it will display a normal Microsoft Office document and run the evil code in the background.
-
50Embedding Any Malware in a Microsoft Office DocumentVídeo Aula
In this lecture you will learn how to embed any evil file with a legitimate Microsoft Office.
-
51IntroductionVídeo Aula
This lecture will give you an overview of what you'll learn in this section, the lab setup that I will use and how to replicate it.
-
52Hacking Mac OS X Using A Meterpreter BackdoorVídeo Aula
In this lecture you will learn how to use a tool called msfvenome to generate a meterpreter backdoor for OS X.
msfvenom can be used to generate backdoors for all operating systems, so the steps shown in this lecture can be used to generate backdoors for other operating systems other than OS X.
-
53Hacking Mac OS X Using An Empire StagerVídeo Aula
This lecture will teach you how to generate a basic Empire backdoor for Mac OS X.
-
54Converting Basic Backdoor To An ExecutableVídeo Aula
This lecture will teach you how to convert the backdoor we made in the previous lecture to an executable.
-
55Embedding A Normal File With BackdoorVídeo Aula
This lecture will teach you how to embed the backdoor we generated before with any other file such as an image or a pdf.
-
56Generating a Basic Trojan For Mac OS XVídeo Aula
In this lecture we will have a look on a download and execute payload for OSX, we will use it to generate a trojan that would open a PDF, but at the same time it will execute a meterpreter payload in the background.
-
57Changing Trojan's IconVídeo Aula
This lecture will teach you how to change the icon of our trojan to something that represents the file that the target is expecting.
-
58Configuring The Trojan To Run SilentlyVídeo Aula
This is the last step of creating our perfect trojan, in this lecture you will learn how to configure the trojan to run silently and only display the file that the target is expecting while running our evil file silently in the background.
-
59Installing Ubuntu As a Virtual MachineVídeo Aula
This lecture will teach you how to install Ubuntu Linux as a virtual machine so that we can use it to practice hacking into Linux
-
60Hacking Into Linux-Like Systems Using One CommandVídeo Aula
In this lecture you will learn how to agin access to any OS that uses bash (Linux, OS X, Android) using one command!
-
61More Advanced Linux BackdoorVídeo Aula
This lecture will teach you how to generate a more advanced backdoor for Linux systems.
-
62Using A Remote Keylogger To Capture Key Strikes Including PasswordsVídeo Aula
In this lecture we will test the keylogger we generated in the previous lecture and spy on a Ubuntu Linux machine.
-
63Recovering Saved Passwords From A Local MachineVídeo Aula
In this lecture you will learn how to use LaZagne to recover saved passwords from a local Linux machine.
-
64Execute & Report PayloadVídeo Aula
In this lecture we will have a look on a very useful payload, this payload can be used to execute any command one the target machine and send the result to us by email.
-
65Recovering Saved Passwords From A Remote MachineVídeo Aula
In this lecture we will use the execute & report payload to download & execute LaZagne then send the recovered passwords to us by email.
-
66Embedding Malware in a Legitimate Linux Package - Part 1Vídeo Aula
In this lecture you will learn how to embed evil code inside a legitimate .deb file.
-
67Embedding Malware in a Legitimate Linux Package - Part 2Vídeo Aula
In this lecture you will learn how to convert that package that we made in the previous video to a deb package, and use it to hack a Linux machine.
-
68Backdooring Android AppsVídeo Aula
This lecture will teach you how to embed a backdoor in a legitimate Android app and use it to hack Android phones.
-
69IntroductionVídeo Aula
This lecture will give you an overview of the contents of this section.
-
70Mail Deliver - Setting up an SMTP ServerVídeo Aula
Spoofing emails is one of the best methods to communicate with your target , in this lecture you'll learn how to set up your own mail server to emails to your target and make them appear as if they're sent from any email you want.
-
71Mail Delivery - Spoofing EmailsVídeo Aula
this lecture will teach you how to use the email server you created in the previous lecture to send emails that appear like they're sent from any email you want.
-
72Mail Delivery - Spoofing Email NameVídeo Aula
-
73Mail Delivery - Spoofing Emails (method 2)Vídeo Aula
This lecture shows another method to spoof emails so they appear like they're sent from any email address.
-
74Hacking OS X & Linux Using Pure Social Engineering Without Sending Any FilesVídeo Aula
In this lecture we will consider a scenario where we will use a number of techniques that we learned so far to hack into OS X or a Linux machine only by sending the target an email.
-
75Creating A Replica Of Any Website / Login PageVídeo Aula
This lecture will teach you how to make an exact copy of any website you want!
-
76Stealing Login Info Using Fake A Login PageVídeo Aula
In this lecture you will learn how to create a fake login page identical to the a real login page and social engineer your target to enter their login info in it.
-
77BeEF Overview & Basic Hook MethodVídeo Aula
BeEF is a browser exploitation framework that allows us to run a large number of commands on hooked browser.
In this lecture we will have an overview of the interface, how to start the framework and how to create a hook page and hook targets to it.
-
78Injecting BeEF's Hook In Any WebpageVídeo Aula
This lecture will teach you how to inject BeEF's hook in any web page you want.
-
79URL ManipulationVídeo Aula
This lecture will teach you a number of tricks to manipulate URLs to make them look less suspicious and increase the chances of the target clicking on them.
-
80Luring Targets Into Accessing Malware Without Direct InteractionVídeo Aula
In this lecture you will learn how to lure your target into browsing an evil URL without communicating with them.
-
81Basic BeEF CommandsVídeo Aula
In this lecture you learn how to run some basic commands on the target machine using beef, you'll learn how to run any Javascript code, get a screenshot of the page they're browsing and redirect them to any page you want.
-
82Stealing Credentials/Passwords Using A Fake Login PromptVídeo Aula
In this video you will learn how to use beef to display a fake login dialog to the target user and steal the password they enter, dialogs can be made for facebook, youtube, microsoft or you can even create your own using the custom option.
-
83Hacking Windows 10 Using A Fake UpdateVídeo Aula
In this video we will use BeEF to create a fake clippy tip telling the user that there is a new update, the update is actually a backdoor, so once they install that update we will gain full control over the target machine.
-
84Hacking Mac OS X Using A Fake UpdateVídeo Aula
In this video we will use BeEF to create a fake notification bar telling the user that there is a new update, the update is actually a backdoor, so once they install that update we will gain full control over the target machine.
-
85Hacking Linux Using A Fake UpdateVídeo Aula
In this lecture we will show a flash pop up telling the target that there is a new update, once they install the update they will install flash and run our backdoor in the background.
