Ethical Hacking Weaponization

Published 1/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 438.17 MB | Duration: 0h 46m


 

Hack using Office Douments

What you'll learn

Hack PC using Word Document

How to do VBA scripting

Types of Reverse Shells

How to use Meterpreter shell

Requirements

No prior knowledge required

Description

A hacker can simply break into a system to show that it is vulnerable, or he can be so mischievous that he wants to hold or maintain a connection in the background without the user's knowledge. This can happen with Trojan horses, rootkits, or other malicious files. The goal is to maintain access to the target until he completes the tasks he intends to perform in that target.Cyber ​​attacks are not to be taken lightly. It doesn't matter if you have the most secure firewall in the world; every step in the cyber kill chain reduces your security and leads to breaches of your network. That's why it's so important to know how to spot an attack when it happens or ideally, stop it in the first place.In this course you will learn how you can hack a computer using an office document and also using an html application. You'll learn how to create a reverse shell giving you complete access over the computer. You will be able to launch a reverse shell as soon as the user opens the office document. You will learn about metasploit too, a tool that is often used in computer hacking. You will learn how to use the metasploit console and use it to create a reverse shell.This is a bners course, you don't need any prior knowledge but some computer knowledge like Linux basics and networking is recommended.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 What is Kali Linux?

Lecture 3 Note

Section 2: VBA

Lecture 4 Windows Scripting Host (WSH, VB)

Lecture 5 WSH, VB

Lecture 6 VBA inside Office

Lecture 7 Note

Lecture 8 Hack with Word Document

Lecture 9 Note

Section 3: HTA

Lecture 10 HTA - HTML Application

Lecture 11 Note

Lecture 12 Reverse Shell

Lecture 13 Note

Lecture 14 Meterpreter shell

Bner Ethical Hackers

HomePage:

https://www.udemy.com/course/ethical-hacking-weaponization/

 

Ethical Hacking Weaponization

 

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Themelli   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss