Introduction
  • About the instructor
  • What is Social Engineering. What to expect from this course
  • Types of Social Engineering
  • Join Our Online Classroom!
Information Gathering
  • Information Gathering using Search Engines and Social Networks - part 1
  • Information Gathering using Search Engines and Social Networks - part 2
  • Introduction to Maltego
  • Maltego - demo
Social Engineering Toolkit (SET)
  • Introduction to SET
  • Social Engineering Toolkit - Demo: Harvest Facebook Credentials
Social Engineering using Metasploit
  • Introduction to Metasploit
  • Backdoor in Windows using Metasploit
  • Backdoor in Android using Metasploit
Attacking the users trough websites - XSS and Beef-XSS
  • Introduction to Cross-Site Scripting and Beef-XSS
  • XSS example - reflected
  • XSS example - stored
  • Beef-XSS Demo
Final words
  • Countermeasures for Social Engineering
  • This is (not) the end!
(Bonus) Web attacks
  • Usernames and Passwords Brute-Forcing using Burp
  • Spider and Analyze a Website using Burp
  • Brute-frocing Web Resources using Dirb and Dirbuster
  • Bonus - OWASP Top 10 Vulnerabilities
(Bonus) Network Attacks
  • Demo - Exploiting FTP Server Vulnerability using Metasploit
  • Demo - Hack SSH passwords using Hydra
  • Hack Linux Passwords using John the Ripper
  • Penetration Testing on Wireless Networks
  • Case Study – Windows Hosted Network Bug or Feature
(Bonus) Android reverse Engineering
  • APK file Structure. AndroidManifest XML file
  • Reversing to get Source code of the Application - decompiling with dex2jar
  • Reversing and Re-compiling With APKTool
  • Static Analysis of Android Application using QARK
  • Further information