Windows 10 Hacking With Kali Linux In English

Become A Windows 10 Hacker

Advanced 0(0 Ratings) 0 Students enrolled
Created by Hacker Computer School Last updated Sat, 18-Jul-2020 English
What will i learn?
  • Full Windows 10 Hacking With All Type Attacks

Curriculum for this course
77 Lessons 08:33:07 Hours
Preparing
8 Lessons 00:26:29 Hours
  • Installing Kali Linux 2 0 as a Virtual Machine VirtualBox 00:04:53
  • Part - 2 00:02:38
  • Installing Kali Linux 2 0 as ISO image 00:06:11
  • Setup Windows 10 as a Virtual Machine 00:02:29
  • Setup Metasploitable as a Virtual Machine 00:02:25
  • Configure the Network Settings 00:04:47
  • Connecting Wi Fi card to the Virtual Machine 00:01:30
  • Updating Kali Linux 00:01:36
  • Introduction 00:01:22
  • Discovering the connected clients 00:04:14
  • Scanning the target OS Part 1 00:13:12
  • Scanning the target OS Part 2 00:08:21
  • Scanning the target OS using GUI 00:06:07
  • Gaining Access introduction 00:01:04
  • Metasploit Fundamentals 00:12:30
  • Creating a Payload using Msfvenom 00:06:06
  • Creating an Encoded Payload using Msfvenom 00:06:00
  • Testing the Payload in the target OS 00:07:27
  • Introduction 00:00:49
  • Installing Veil Framework 00:03:39
  • Creating an undetectable Payload 00:07:46
  • Combine an EXE file with the Payload 1st method 00:08:40
  • Combine an EXE file with the Payload 2nd method 00:05:59
  • Combine the Payload with an ImagePDFMP3 etc 00:11:41
  • Combine the Payload with an Excel Word file 00:09:21
  • Spoofing the Backdoor extension 00:07:10
  • Introduction 00:00:55
  • Interact with the Target Computer Part 1 00:06:30
  • Interact with the Target Computer Part 2 00:06:12
  • Persist your connection in the target OS 00:07:47
  • Escalate your privileges in Windows 10 00:07:23
  • Escalate your privileges in Windows 8 00:05:19
  • Migrating the Backdoor with the running processes 00:07:54
  • Check the virtualization Clear log event 00:05:56
  • Uninstalling programs from the target OS 00:05:19
  • AddRemove users and changing the Admin password 00:05:56
  • What is Pivoting 00:10:45
  • Pivot from the Victim System to Own Every Device on the Network 1st Case 00:10:37
  • Pivot from the Victim System to Own Every Device on the Network 2nd Case 00:12:25
  • Stealing the target Wi Fi password 00:08:07
  • Capture the keystrokes of the target keyboard 00:06:58
  • Stealing Windows credentials 00:06:34
  • Cracking the administrator password 00:08:48
  • Stealing the stored passwords Visited websites 00:09:51
  • Recover the deleted files from the target OS 00:08:03
  • Enumerate USB Drive history 00:02:20
  • Redirect the target from to any website 00:16:14
  • Introduction 00:00:56
  • Hooking the target browser with BeEF 00:12:05
  • Play any sound in the target browser 00:09:30
  • Capture a screenshot from the target browser 00:02:48
  • Redirect the target to any website 00:05:45
  • Run any YouTube video in the target browser 00:04:22
  • Stealing the target online accounts with BeEF 00:05:49
  • Integrate Metasploit framework with BeEF Project 00:08:32
  • Hacking the target Windows OS through the hooked browser 00:08:59
  • Having some fun with BeEF 00:08:29
  • Introduction 00:01:18
  • Configuring the router and port forwarding 1st method 00:09:17
  • Configure the Backdoor 00:05:31
  • Port forwarding using VPS SSH tunnel 2nd method 00:14:27
  • Configure BeEF over WAN network 00:05:54
  • Detect Kill any Meterpreter session 00:06:15
  • Detect the running backdoor manually 00:10:00
  • Detecting the combined backdoor with an imagepdf etc 00:01:47
  • Detecting the combined backdoor MD5 hash 00:04:24
  • Encrypting your keyboard keystrokes 00:05:55
  • Analyzing the network connections 00:06:39
  • Analyze the running processes 00:04:04
  • Detecting the backdoor using a Sandbox 00:04:16
  • Demonstration 00:02:03
  • The Theory 00:01:22
  • The needed hardware and software 00:07:49
  • Installing needed software 00:03:43
  • Converting the commands to Arduino script CC 00:10:27
  • Change the administrator password and force him to sign out 00:17:16
  • Fully control any Windows OS within 2 seconds 00:15:35
Requirements
  • 8 GB RAM & Internet Connection
+ View more
Description

Hi friends this is very advance course for you in this course you will learn about windows 10 hacking. You will learn attack in this course such as wan attack, post attack, information collect, scanning, fud payload, virus detect in your pc and so on..

+ View more
Other related courses
About the instructor
  • 0 Reviews
  • 5 Students
  • 12 Courses
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
$50 $100
Buy now
Includes:
  • 08:33:07 Hours On demand videos
  • 77 Lessons
  • Full lifetime access
  • Access on mobile and tv