Companies Home Search Profile

Ethical Hacking: Weaponization

Focused View

Peter A

44:38

66 View
  • 1 - Introduction.mp4
    01:13
  • 2 - What is Kali Linux.mp4
    03:08
  • 3 - Note.html
  • 4 - Windows Scripting Host WSH VB.mp4
    05:25
  • 5 - WSH VB.html
  • 6 - VBA inside Office.mp4
    05:12
  • 7 - Note.html
  • 8 - Hack with Word Document.mp4
    10:16
  • 9 - Note.html
  • 10 - HTA HTML Application.mp4
    05:53
  • 11 - Note.html
  • 12 - Reverse Shell.mp4
    06:23
  • 13 - Note.html
  • 14 - Meterpreter shell.mp4
    07:08
  • Description


    Hack using Office Douments

    What You'll Learn?


    • Hack PC using Word Document
    • How to do VBA scripting
    • Types of Reverse Shells
    • How to use Meterpreter shell

    Who is this for?


  • Beginner Ethical Hackers
  • More details


    Description

    A hacker can simply break into a system to show that it is vulnerable, or he can be so mischievous that he wants to hold or maintain a connection in the background without the user's knowledge. This can happen with Trojan horses, rootkits, or other malicious files. The goal is to maintain access to the target until he completes the tasks he intends to perform in that target.

    Cyber ​​attacks are not to be taken lightly. It doesn't matter if you have the most secure firewall in the world; every step in the cyber kill chain reduces your security and leads to breaches of your network. That's why it's so important to know how to spot an attack when it happens -- or ideally, stop it in the first place.

    In this course you will learn how you can hack a computer using an office document and also using an html application. You'll learn how to create a reverse shell giving you complete access over the computer. You will be able to launch a reverse shell as soon as the user opens the office document. You will learn about metasploit too, a tool that is often used in computer hacking. You will learn how to use the metasploit console and use it to create a reverse shell.

    This is a beginners course, you don't need any prior knowledge but some computer knowledge like Linux basics and networking is recommended.


    Who this course is for:

    • Beginner Ethical Hackers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Ethical Hacker with Software Development background. I first started programming long ago as a hobby and along the way learned many things. I've programmed in basic, c++, java and many other languages. I'm programming as a hobby. I've used a variety of operating systems and also database systems. I'm here to share my experience. Then I got into Ethical Hacking
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 8
    • duration 44:38
    • Release Date 2023/02/26