Preparing
  • Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox)
  • Installing Kali Linux 2.0 as a Virtual Machine (VMware)
  • Installing Kali Linux 2.0 as ISO image
  • Setup Windows 10 as a Virtual Machine
  • Setup Metasploitable as a Virtual Machine
  • Configure the Network Settings
  • Connecting Wi-Fi card to the Virtual Machine
  • Updating Kali Linux
Information Gathering
  • Introduction
  • Discovering the connected clients
  • Scanning the target OS (Part 1)
  • Scanning the target OS (Part 2)
  • Scanning the target OS using GUI
Gaining Access
  • Gaining Access introduction
  • Metasploit Fundamentals
  • Creating a Payload using Msfvenom
  • Creating an Encoded Payload using Msfvenom
  • Testing the Payload in the target OS
Encoding and Combining the Payload
  • Introduction
  • Installing Veil Framework
  • Creating an undetectable Payload
  • Combine an EXE file with the Payload (1st method)
  • Combine an EXE file with the Payload (2nd method)
  • Combine the Payload with an Image,PDF,MP3 etc....
  • Combine the Payload with an Excel, Word file
  • Spoofing the Backdoor extension
Post Exploitation
  • Introduction
  • Interact with the Target Computer (Part 1)
  • Interact with the Target Computer (Part 2)
  • Persist your connection in the target OS
  • Escalate your privileges in Windows 10
  • Escalate your privileges in Windows 8.1/8/7
  • Migrating the Backdoor with the running processes
  • Check the virtualization & Clear log event
  • Uninstalling programs from the target OS
  • Add/Remove users and changing the Admin password
  • What is Pivoting?
  • Pivot from the Victim System to Own Every Device on the Network (1st Case)
  • Pivot from the Victim System to Own Every Device on the Network (2nd Case)
  • Stealing the target Wi-Fi password
  • Capture the keystrokes of the target keyboard
  • Stealing Windows credentials
  • Cracking the administrator password
  • Stealing the stored passwords & Visited websites
  • Recover the deleted files from the target OS
  • Enumerate USB Drive history
  • Redirect the target from to any website
Hooking with BeEF
  • Introduction
  • Hooking the target browser with BeEF
  • Play any sound in the target browser
  • Capture a screenshot from the target browser
  • Redirect the target to any website
  • Run any YouTube video in the target browser
  • Stealing the target online accounts with BeEF
  • Integrate Metasploit framework with BeEF Project
  • Hacking the target Windows OS through the hooked browser
  • Having some fun with BeEF
Perform the previous attacks over WAN Network
  • Introduction
  • Configuring the router and port forwarding (1st method)
  • Configure the Backdoor
  • Port forwarding using VPS SSH tunnel (2nd method)
  • Configure BeEF over WAN network
Protection & Detection
  • Detect & Kill any Meterpreter session
  • Detect the running backdoor manually
  • Detecting the combined backdoor with an image,pdf etc...
  • Detecting the combined backdoor (MD5 hash)
  • Encrypting your keyboard keystrokes
  • Analyzing the network connections
  • Analyze the running processes
  • Detecting the backdoor using a Sandbox
Hacking any Windows OS just by plugging a USB stick (Bonus Section)
  • Demonstration
  • The Theory
  • The needed hardware and software
  • Installing needed software
  • Converting the commands to Arduino script (C/C++)
  • Change the administrator password and force him to sign out
  • Fully control any Windows OS within 2 seconds
Conclusion
  • Conclusion
Bouns Section
  • Bonus Lecture - Discounts On all My Ethical Hacking Courses