Udemy - Ethical Hacking For Mobile Phones, Facebook & Social Media! [TP]
You will get to see screen capture live tutorials showing you everything you need to do to get started with ethical hacking and penetration testing including information about all of the topics below!
Learn the techniques employed by security enthusiasts to break into user’s Social media accounts, phones or machines using client side exploitation techniques. We will cover leveraging client side application functionalities or loopholes to achieve the hack and how to defend against such attacks.
You will also understand how to be both creative and careful when crafting your social engineering attacks.
The course covers variety of topics ranging from hacking facebook user accounts using phishing techniques and how to defend against them. It extends to exploiting phones, systems and learning how to defend from such attacks which comprise the client side exploitation domain.
Here is what we will cover:
Phishing (Social network accounts such as Facebook, Twitter, etc.) Browser attacks Macro based client side hack Android Phone hacking Defend against all client side attacks
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
2. Creating your hacking environment with VirtualBox and Kali Linux/1. Environment setup lecture.mp4
27.5 MB
2. Creating your hacking environment with VirtualBox and Kali Linux/1. Environment setup lecture.vtt
6 KB
3. Getting started using ethical hacking and penetration testing/1. Stealing facebook credentials via phishing attack.mp4
42.4 MB
3. Getting started using ethical hacking and penetration testing/1. Stealing facebook credentials via phishing attack.vtt
9.4 KB
3. Getting started using ethical hacking and penetration testing/2. How to defend against phishing attacks.mp4
4.9 MB
3. Getting started using ethical hacking and penetration testing/2. How to defend against phishing attacks.vtt
2.4 KB
3. Getting started using ethical hacking and penetration testing/3. User Browser hacking using Beef exploitation framework.mp4
52.4 MB
3. Getting started using ethical hacking and penetration testing/3. User Browser hacking using Beef exploitation framework.vtt
13.3 KB
3. Getting started using ethical hacking and penetration testing/4. How to defend against browser attacks.mp4
12 MB
3. Getting started using ethical hacking and penetration testing/4. How to defend against browser attacks.vtt
2.6 KB
3. Getting started using ethical hacking and penetration testing/5. User machine hacking via word and excel documents.mp4
40.8 MB
3. Getting started using ethical hacking and penetration testing/5. User machine hacking via word and excel documents.vtt
7.9 KB
3. Getting started using ethical hacking and penetration testing/6. How to defend against macro attacks.mp4
8.3 MB
3. Getting started using ethical hacking and penetration testing/6. How to defend against macro attacks.vtt
3.3 KB
3. Getting started using ethical hacking and penetration testing/7. Hacking android phones for fun and profit Part 1.mp4
54 MB
3. Getting started using ethical hacking and penetration testing/7. Hacking android phones for fun and profit Part 1.vtt
12.1 KB
3. Getting started using ethical hacking and penetration testing/8. Backdooring android apps for fun and profit Part 2.mp4
43.6 MB
3. Getting started using ethical hacking and penetration testing/8. Backdooring android apps for fun and profit Part 2.vtt
9.5 KB
3. Getting started using ethical hacking and penetration testing/9. How to defend against android attacks.mp4
4.7 MB
3. Getting started using ethical hacking and penetration testing/9. How to defend against android attacks.vtt