|
(W00) Course Instructions |
|
00:00:00 |
Week 1: Excuse-me sir, could you give me your password? |
|
(W16M01) Week 1 Overview |
|
00:00:00 |
|
(W16M02) Introduction To Social Engineering - Video |
|
00:00:00 |
|
(W16M03) Introduction To Social Engineering |
|
00:00:00 |
|
(W16M04) Defining Social Engineering - Video |
|
00:00:00 |
|
(W16M05) Social Engineering Life Cycle |
|
00:00:00 |
|
(W16M06) SE Life Cycle - Video |
|
00:00:00 |
|
(W16M07) Psychological Introduction to Influence and Manipulation |
|
00:00:00 |
|
(W16M08) Introduction to Rapport - Video |
|
00:00:00 |
|
(W16M09) Introduction to Influence & Manipulation |
|
00:00:00 |
|
(W16M10) The Six Principles of Influence |
|
00:00:00 |
|
(W16M11) Introduction to Influence Aspects of Social Engineering - Video |
|
00:00:00 |
|
(W16M12) The Influence Model |
|
00:00:00 |
|
(W16M13) Introduction to Personality Types - Video |
|
00:00:00 |
|
(W16M14) Remote Analysis: Types of Personality |
|
00:00:00 |
|
(W16M15) Digital Profiling: Creating our Initial Repository with Dradis Framework |
|
00:00:00 |
|
(W16M16) Dradis Frameworks Basic Usage for Digital Profiling - Video |
|
00:00:00 |
|
(W16M17) Final Considerations - Video |
|
00:00:00 |
|
(W16M18) Appendix |
|
00:00:00 |
|
(W16A01) Task one: Imagine you live in Gotham... |
30, 00:00 |
|
(W16A02) Task two: Chief Gordon calls! |
30, 00:00 |
|
(W16A03) Task three: Chief Gordon wants a report. |
30, 00:00 |
Week 2: I know what you did last summer |
|
(W16M20) Welcome to Module II |
|
00:00:00 |
|
(W16M21) Welcome to Module II – I know what you did last summer |
|
00:00:00 |
|
(W16M22) Introduction to Digital Information Gathering |
|
00:00:00 |
|
(W16M23) Introduction to OSINT - Open Source Intelligence - Video |
|
00:00:00 |
|
(W16M24) OSINT Frameworks & Tools |
|
00:00:00 |
|
(W16M25) theHarvester |
|
00:00:00 |
|
(W16M26) Practical theHarvester Usage - Video |
|
00:00:00 |
|
(W16M27) Shodan – The First Search Engine for Internet of Things |
|
00:00:00 |
|
(W16M29) Scythe Framework |
|
00:00:00 |
|
(W16M30) Scythe Account Enumerator - Video |
|
00:00:00 |
|
(W16M31) Recon-NG Framework |
|
00:00:00 |
|
(W16M32) Recon-ng basic usage - Video |
|
00:00:00 |
|
(W16M32) SpiderFoot: Open Source Intelligence Automation |
|
00:00:00 |
|
(W16M33) Spiderfoot framework configuration & usage - Video |
|
00:00:00 |
|
(W16M34) Paterva Maltego |
|
00:00:00 |
|
(W16M35) Maltego Usage - Video |
|
00:00:00 |
|
(W16M36) FOCA: Target Information Gathering with Metadata |
|
00:00:00 |
|
(W16M37) Using FOCA - Video |
|
00:00:00 |
|
(W16M38) Google Hacking – Using Google Dorks |
|
00:00:00 |
|
(W16M39) Introduction to Cold Calling |
|
00:00:00 |
|
(W16M40) Demonstration of Spoofcard App on Android - Video |
|
00:00:00 |
|
(W16M41) Final Considerations - Video |
|
00:00:00 |
|
(W16M42) Appendix |
|
00:00:00 |
|
(W16A04) Target the Target - Dradis Practice |
30, 00:00 |
|
(W16A05) Recon-ng practice |
30, 00:00 |
|
(W16A06) Zeus Botnet Practice |
30, 00:00 |
Week 3: The Heist |
|
(W16M44) Welcome to the Heist - Video |
|
00:00:00 |
|
(W16M45) The Heist - Module Overview |
|
00:00:00 |
|
(W16M46) Morning Catch – Client Side Attacks Laboratory |
|
00:00:00 |
|
(W16M47) Introduction to Morning Catch - Video |
|
00:00:00 |
|
(W16M48) Morning Catch Basic Usage - Video |
|
00:00:00 |
|
(W16M49) The Social Engineer Toolkit (SET) |
|
00:00:00 |
|
(W16M50) Introduction to SET (Social Engineering Toolkit) - Video |
|
00:00:00 |
|
(W16M51) Spear Phishing Attacking Vectors - Video |
|
00:00:00 |
|
(W16M52) Web Attack Vectors – Java Applet Attack Method - Video |
|
00:00:00 |
|
(W16M53) Web Attack Vectors – Metasploit Browser Exploit Method - Video |
|
00:00:00 |
|
(W16M54) Web Attack Vectors – Credential Harvester Attack Method - Video |
|
00:00:00 |
|
(W16M55) Simple Phishing Toolkit |
|
00:00:00 |
|
(W16M56) Sptoolkit Installation - Video |
|
00:00:00 |
|
(W16M57) Sptoolkit Introduction to Dashboard - Video |
|
00:00:00 |
|
(W16M58) Sptoolkit Phishing Campaign Creation - Video |
|
00:00:00 |
|
(W16M59) Phishing Frenzy |
|
00:00:00 |
|
(W16M60) Installing Phishing Frenzy on Kali Linux and Basic Usage |
|
00:00:00 |
|
(W16M61) Phishing Frenzy Installation on Kali Linux, by Brandon McCann - Video |
|
00:00:00 |
|
(W16M62) Phishing Frenzy Dashboard Features - Video |
|
00:00:00 |
|
(W16M63) Creating a Phishing Campaign - Video |
|
00:00:00 |
|
(W16M64) Credential Harvesting Template Creation - Video |
|
00:00:00 |
|
(W16M65) Email Enumeration within Phishing-Frenzy - Video |
|
00:00:00 |
|
(W16M66) Powershell Attack Vectors - Video |
|
00:00:00 |
|
(W16M67) Social Engineering Ninja V0.4 |
|
00:00:00 |
|
(W16M68) Social Engineering Ninja 4.0 Framework - Video |
|
00:00:00 |
|
(W16M69) What is BeEF? |
|
00:00:00 |
|
(W16M70) BeEF Dashboard Introduction - Video |
|
00:00:00 |
|
(W16M71) BeEF Persistence Modules - Video |
|
00:00:00 |
|
(W16M72) Beef Social Engineering Modules: Clippy & Flash Update - Video |
|
00:00:00 |
|
(W16M73) Beef – Pretty Theft - Video |
|
00:00:00 |
|
(W16M74) Final Considerations - Video |
|
00:00:00 |
|
(W16A07) Morning Catch Practice |
30, 00:00 |
|
(W16A08) Phishing Frenzy Practice |
30, 00:00 |
|
(W16A09) BeEF Practice |
30, 00:00 |
Week 4: Scavenging and Looting |
|
(W16M76) Module 4 - Introduction Video |
|
00:00:00 |
|
(W16M77) Module 4 Overview |
|
00:00:00 |
|
(W16M78) Hidden Camera Gears |
|
00:00:00 |
|
(W16M79) GPS Trackers |
|
00:00:00 |
|
(W16M80) Introduction to lockpicking |
|
00:00:00 |
|
(W16M81) Hidden Audio Recorders |
|
00:00:00 |
|
(W16M82) Hardware Keyloggers |
|
00:00:00 |
|
(W16M83) Hak5 Stuff |
|
00:00:00 |
|
(W16M84) Final Considerations |
|
00:00:00 |
Final Test |
|
(W16Q01) Final Test |
|
00:25:00 |