Mô tả

Welcome to my comprehensive course that will teach you how to use the cloud for hacking. With NO prior knowledge required, this course takes you from a beginner  to an expert at launching advanced attacks from the cloud. Giving you the ability to hack online accounts, web browsers, bypass two or multi factor authentication, and gain full remote control over all operating systems (Windows, Linux and Apple Mac OS) from within the cloud. That's not all, you'll also be able to use the cloud knowledge you acquire in this course to host your own websites and your own cloud applications.


This course is highly practical but it won't neglect the theory. We'll start with basics of ethical hacking and cloud computing. Then we'll dive and start using the cloud for hacking straight away. You'll learn everything by example, by hacking online accounts, computers, and browsers, no boring dry lectures. By the end of the course you will have a strong foundation in cloud computing and ethical hacking.


To achieve this the course is divided into a number of sections, each aims to teach you a specific hacking technique! You'll first learn the cloud concepts related to this technique, then you'll learn how to use the cloud to hack computers, phones, browsers, online accounts and much more. As we do this I will also introduce you to different hacking concepts, tools and techniques. Everything will be taught through examples and hands-on practicals, there will be no useless or boring lectures!


All the techniques in this course are practical and work against real systems, you'll understand the whole mechanism of each technique first, then you'll learn how to use it to hack from the cloud. Therefore by the end of the course you'll be able to modify these techniques to launch more powerful attacks, and adopt them to suit different situations and different scenarios .


As mentioned this course will will teach you both ethical hacking and cloud computing at the same time, here are some of the topics that will be covered in the course:


Hacking topics:

  • Phishing basics + advanced.

  • Clone / replicate any website on the internet.

  • Bypass two or multi factor authentication (2FA / MFA).

  • Hacking online accounts such as Whatsapp accounts, email accounts, etc.

  • Hacking Windows, Apple Mac OS and Linux from the cloud.

  • Creating backdoors for Windows, Apple Mac OS and Linux.

  • Creating trojans for Windows, Apple Mac OS and Linux.

  • Hacking web browsers on all operating systems  and devices.

  • Stealing credentials using fake prompts .

  • Stealing sensitive info from hacked computers.

  • Accessing system resources such as the keyboard and camera from the cloud.

  • Advanced malware delivery using specialised cloud services.

  • Cross-platform download page to serve the right malware based on the target's OS.

  • URL manipulation to include convincing words such as Facebook.

  • Generating convincing download links with safe extensions such as .pdf.

  • Launching ransomware attacks from the cloud.

  • Tracking any device from the cloud using a link.

  • Read, write download, upload and execute files on compromised systems.

  • Botnet basics and concepts.


Cloud topics:

  • Install & use Kali Linux from the cloud.

  • Cloning websites on the internet.

  • Install a GUI on cloud servers and access their desktop.

  • Hosting your own websites and cloud applications.

  • Enabling HTTPs.

  • Understand DNS and the different record types.

  • Use Amazon's cloud service AWS.

  • Configuring firewall rules.

  • Link a domain name to cloud servers.

  • SSH basics.

  • FTP and SFTP basics.

  • Apache2 basics.

  • Novnc.


Other topics:

  • PHP basics.

  • Javascript basics

  • AI Basics

  • Linux basics.

  • Linux commands.

  • How to use the Linux terminal.


Throughout the course you'll learn how to use use the following tools to achieve the above:

  • Kali Linux

  • AWS.

  • SSH.

  • Certbot

  • Evilginx.

  • Pwndrop.

  • Filezilla.

  • Openvnc.

  • Empire.

  • Starkiller

  • Distopia

  • Netcat.

  • BeEF.


Checkout the curriculum and the course teaser for more info!


With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within less than 15 hours.


Notes:

  • This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

  • This course is totally a product of Zaid Sabih & zSecurity, no other organisation is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANISATION IS INVOLVED.

Bạn sẽ học được gì

80 videos (8:45 hours) teaching you how to use the cloud for hacking.

Generate phishing pages & Bypass 2FA / MFA.

Hack any account with web interface such as whatsapp, email accounts, etc.

Hack all operating systems from the cloud (Windows, Linux, Apple Mac OS).

60+ hands-on real-life hacking examples.

No prior knowledge required

Understand cloud concepts and use them for hacking.

Hack web browsers on all operating systems and devices.

Create trojans for Windows, Linux and Apple Mac OS.

Hack Windows using Discord.

Install & use Kali Linux from the cloud.

Deliver malware like an expert hacker using specialised cloud services.

Create a custom cross-platform download page to serve the right malware based on the target's OS.

URL manipulation to include convincing words such as Facebook.

Generate convincing download links with safe extensions such as .pdf.

Launch ransomware attacks.

Find exact location of anyone using a link.

Clone / replicate any website on the internet.

Read, write download, upload and execute files on compromised systems.

Capture keystrikes on a compromised system.

Steal sensitive info from hacked computers.

Access webcam and keyboard of hacked computers

Steal Windows passwords

Install a GUI on cloud servers and access their desktop.

Understand DNS and the different record types.

Use Amazon's cloud service AWS.

Link a domain name to cloud servers.

Enable HTTPS on cloud hacking tools.

Botnet basics and concepts.

Use C2 / C&C to Hack Windows, Linux and Apple Mac OS

PHP basics.

Javascript basics

AI Basics

Linux basics.

Linux commands.

How to use the Linux terminal.

Yêu cầu

  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / Apple Mac OS / Linux.

Nội dung khoá học

18 sections

Introduction to Cloud Computing For Hackers

4 lectures
Teaser
06:12
Introduction to Hacking Using the Cloud
04:09
What is The Cloud?
05:06
Why Learn Cloud Computing as a Hacker?
02:24

Cloud Basics

5 lectures
Introduction to Cloud Basics
00:30
Signing Up With AWS
03:46
Installing Kali Linux On The Cloud
09:24
Communicating With Cloud Computers Remotely Using SSH
06:53
Linux Terminal Basics
09:30

Phishing

10 lectures
Introduction to Phishing
02:31
File Hosting & Firewall Settings
11:51
Cloning Websites & Uploading Them to The Cloud
08:21
Creating a Fake Login Page On The Cloud
05:29
Modifying the Page to Steal Login Information
08:55
Stealing Facebook Login Using an Identical Fake Login Page
09:43
Domain Name & DNS Basics
08:52
Linking Domain Names to Phishing Pages
07:20
Introduction to HTTPS
06:03
Enabling HTTPS on Phishing Pages
07:31

Phishing - Bypassing 2 / Multi Factor Authentication (2FA / MFA)

3 lectures
Introduction to Evilginx
07:00
Installing Evilginx on the Cloud
07:48
Bypassing 2FA / MFA
08:44

Accessing Cloud Server Desktop

2 lectures
Introduction and Main Setup
03:53
Accessing The Desktop of Cloud Servers
09:46

BitB - Browser In Browser Attack

6 lectures
Introduction to Browser in Browser Attack
08:08
Polishing the Connection & Installing a Browser
04:34
Building a Malicious Browser
07:53
Enhancing the URL
05:10
Hacking Gmail & Bypassing 2FA / MFA
06:48
Hacking Whatsapp
03:08

Mobile BitB - Mobile Friendly Phishing & 2FA Bypass

4 lectures
Mobile Friendly Phishing Pages
08:31
Hiding the Cursor
08:49
Installing & Configuring a Virtual Keyboard
06:30
Hacking Gmail on Mobile Devices & Bypassing 2FA
06:50

Multi-BitB Attack

3 lectures
Establishing Multiple Independent Connections
09:04
Creating Independent User Sessions
06:40
Stealing Gmail & Facebook Logins From Multiple Devices
09:21

Hacking Web Browsers

8 lectures
Introduction to Browser Hacking
01:37
Installing Needed Software
12:46
Embedding Evil Code in Cloned Websites
09:53
Enabling HTTPS on Malicous Pages
12:00
Windows & Apple Mac OS Web Browser Hacking
05:23
Programming Custom Evil Pages to Access the Target's Location & OS
06:33
Automatically Storing Gathered Information on the Cloud
12:48
URL Manipulation
05:23

Command & Control Servers (C2 / C&C)

2 lectures
Introduction to Command & Control Servers
01:43
What is a C2 & Which is the best?
07:28

Hacking Windows, Linux & Apple Mac OS From the Cloud

5 lectures
Introduction to Empire & Starkiller
10:46
Interacting with Starkiller
05:55
Receiving Backdoor Connections From the Cloud
09:46
Creating a Windows Backdoor Using Starkiller
07:08
Hacking & Controlling Windows 11 Through the Cloud
05:00

Post Exploitation With StarKiller

6 lectures
File System Access & System Command Execution
08:31
StarKiller Modules Basics
07:02
Finding Sensitive Data on Windows & Module Filtering
06:13
Stealing Windows Passwords
04:37
Capturing Keystrikes & Copied Passwords
04:38
Launching a Ransomeware Attack
07:31

Hacking Windows Using Discord as a C2

4 lectures
Introduction & Setup
05:25
Creating a Discord Server
05:35
Weaponising Discord Servers
04:11
Hacking Windows 11 Through Discord
08:07

Windows Post Exploitation via Discord

4 lectures
Getting Computer info, Location & Stored Passwords
06:12
Remotely Executing System Commands & Getting a Reverse Shell
07:34
Remote File System Management With Upload & Download
06:05
Remote Webcam & Keyboard Access
04:04

Creating Windows Trojans

3 lectures
Introduction to Trojans
00:58
Creating a Basic Trojan
09:18
Improving Torjan's Icon & Behaviour
03:17

Creating Apple Mac OS & Linux Trojans

3 lectures
Generating a Basic Apple and Linux Backdoor
06:26
Hacking Apple Mac OS Using a Trojan
12:01
Hacking Linux Using a Trojan
11:10

Advanced Malware Delivery

7 lectures
Introduction to Advanced Delivery Methods
00:47
Introduction to self-hosting + Demo
06:19
Installing a File Sharing Service on The Cloud
05:59
Manipulating Shared Files on The Cloud
07:56
Hiding / Replacing File Type & Extension
02:50
Manually Enabling HTTPS
06:59
Cross-Platform Malware Delivery
09:10

Bonus Section

1 lectures
Bonus Lecture
03:23

Đánh giá của học viên

Chưa có đánh giá
Course Rating
5
0%
4
0%
3
0%
2
0%
1
0%

Bình luận khách hàng

Viết Bình Luận

Bạn đánh giá khoá học này thế nào?

image

Đăng ký get khoá học Udemy - Unica - Gitiho giá chỉ 50k!

Get khoá học giá rẻ ngay trước khi bị fix.