Introduction
  • Introduction
  • Course Out Line
  • Prerequisite
MetaSploit Crash Course
  • Introduction to Metasploit framework
  • Setup Metasploit in Kali Linux
  • Exploit and Payloads
  • Simple Payload Creation using Metasploit and test it on no-distribute
  • Test Payload on Windows
Introduction to Veil 3.0 Framework
  • Introduction to Veil 3.0
  • Installation of Veil 3.0
Create Payload with Veil 3.0
  • Simple Payload Creation with Veil
  • Advance Payload Creation with Veil Part 1
  • Advance Payload creation with Veil Part 2 (Encoder and BadChars)
Payload Binding Methods
  • Installing Py2exe on Windows
  • Py2Exe to Compile Payload on Windows
  • Binding Payload with jpg
  • Change exe Extension to jpg
Launch an Attack
  • Port Forwarding
  • Attack on WAN
Post Attack and Persistence Connection
  • Post Attack Usage of Meterpreter Part 1
  • Post Attack Usage of Meterpreter Part 2
  • Persistence connection
How to Defend Malware Attacks
  • How to Defend Malware Attacks
Additional Materials
  • Bonus Lecture