Description
This course will teach you the most common social engineering threats and how to protect yourself and your systems from social engineering attacks.You'll learn how to perform attacks on targets using a wide variety of sites and tools, and develop payloads that effectively compromise the system.
By the time you've completed this course, you will have a strong knowledge about social engineering.
Content
Introduction
Course IntroductionSocial Engineering Defined
Evil Files
Create a Malicious File with MSFvenomHow to Create an Undetectable Payload with FatRat
Inject Payload in .exe file using Shellter
Make A Malicious Microsoft Word Document
Exploitation
Meterpreter BasicsExtract Saved Passwords with LaZagne
Capture VNC Session
How to view saved Wi-Fi passwords
How to perform a Man-in-the-middle (MITM) attack
Social Engineering Tools
How To Create a Fake Login Page Using SetoolkitBlackeye Phishing Tool
Browser Exploitation
How to Exploit Web Browsers with BeEFHook Web Browsers with MITMf and BeEF
Gain Full Control over the Target Machine using BeEF
Attacking Outside The Local Network
Hacking Over the Internet Without Port ForwardingHow To Use Setoolkit Outside The Local Network
BeEF Attack Outside the Local Network
Phishing Email Attack
Security
How to Detect Meterpreter in Your PCProtect Yourself from Browser Exploits
How to Avoid Phishing Attacks