Learn Social Engineering From Scratch 2025
-
Introduction
-
Preparation – Creating a Penetration Testing Lab
-
Preparation – Linux Basics
-
Information Gathering
-
Information Gathering – Gathering Info About A Company/Website
-
Information Gathering – Gathering Info About A Person
-
Windows Malware
-
Windows Malware – Generating Undetectable BackdoorsBackdoors and Payloads Basics0sCreating Your Own Backdoor0sListening for Backdoor Connections0sHacking Windows 11 Using Your Own Backdoor0sIntroduction to The Fat Rat0sGenerating An Undetectable Backdoor For Windows – Method 20sIntroduction to Empire0sCreating a Windows Powershell Stager & Hacking Windows 100sModifying Backdoor Source To Bypass All Anti-virus Programs0s
-
Windows Malware – Spying
-
Windows Malware – Enhancing Malware
-
Windows Malware – Creating TrojansEmbedding Malware With Any File Type Like An Image Or PDF0sRunning Malware Silently In The Background0sChanging Trojan’s Icon0sSpoofing File Extension from .exe to anything else (pdf, png, etc.)0sDownload & Execute Payload (Method 2)0sEmbedding Malware With Any File Type Like An Image Or PDF (Method 2)0sEmbedding a Backdoor in Microsoft Office Document0sEmbedding Any Malware in a Microsoft Office Document0s
-
Apple Mac OS MalwareIntroduction0sHacking Mac OS X Using A Meterpreter Backdoor0sHacking Mac OS X Using An Empire Stager0sConverting Basic Backdoor To An Executable0sEmbedding A Normal File With Backdoor0sGenerating a Basic Trojan For Mac OS X0sChanging Trojan’s Icon0sConfiguring The Trojan To Run Silently0s
-
Linux MalwareInstalling Ubuntu As a Virtual Machine0sHacking Into Linux-Like Systems Using One Command0sMore Advanced Linux Backdoor0sUsing A Remote Keylogger To Capture Key Strikes Including Passwords0sRecovering Saved Passwords From A Local Machine0sExecute & Report Payload0sRecovering Saved Passwords From A Remote Machine0sEmbedding Malware in a Legitimate Linux Package – Part 10sEmbedding Malware in a Legitimate Linux Package – Part 20sBackdooring Android Apps0s
-
Delivery MethodsIntroduction0sMail Deliver – Setting up an SMTP Server0sMail Delivery – Spoofing Emails0sMail Delivery – Spoofing Email Name0sMail Delivery – Spoofing Emails (method 2)0sHacking OS X & Linux Using Pure Social Engineering Without Sending Any Files0sCreating A Replica Of Any Website / Login Page0sStealing Login Info Using Fake A Login Page0sBeEF Overview & Basic Hook Method0sInjecting BeEF’s Hook In Any Webpage0sURL Manipulation0sLuring Targets Into Accessing Malware Without Direct Interaction0sBasic BeEF Commands0sStealing Credentials/Passwords Using A Fake Login Prompt0sHacking Windows 10 Using A Fake Update0sHacking Mac OS X Using A Fake Update0sHacking Linux Using A Fake Update0s
-
Using The Above Attacks Outside The Local Network
-
Post Exploitation
-
Post Exploitation – MeterpreterMeterpreter Basics0sFile System Commands0sMaintaining Access (Persistence)0sSpying – Capturing Key Strikes & Taking Screen Shots0sPivoting – Theory (What is Pivoting?)0sPivoting – Exploiting Devices on The Same Network As a Hacked Computer0sControlling Android Phone & Accessing Mic, Camera, Messages, File System & More0sMaintaining Access On OS X0s
-
Post Exploitation – Empire
-
Security
-
Bonus Section
Note: Although social engineering is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic covering more techniques, how to hack more operating systems, advanced exploitation, advanced post exploitation, bypassing security and more!
Welcome to this comprehensive course on Social Engineering! This course assumes you have NO prior knowledge in hacking, it starts with you from scratch and takes you step-by-step to an advanced level. By the end of it you’ll be able to hack all major operating systems (windows, Apple Mac OS, Linux and Android) like black-hat hackers and secure yourself from hackers.
This course is highly practical but doesn’t neglect the theory, we’ll start with basics to teach you how to install the needed software (on Windows, Linux and Apple Mac OS). Then we’ll start hacking straight away, you’ll learn everything by example, no boring lectures! You will understand the theory behind every attack first and then you’ll learn how to use that attack in a practical real life scenario to hack Windows, Linux, Apple Mac OS and Android. So by the end of the course you’ll be able to modify these techniques or combine them to come up with more powerful attacks and adopt them to different scenarios and different operating systems.
The course is divided into a number of sections to represent the steps you’d take to successfully hack a target using social engineering.
1. Information Gathering – First you need to know your target, in this section you’ll learn how to gather information about your target whether it is a company, a website or just a person. You will learn how to discover anything that is associated with your target such as websites, links, companies, users, emails, phone numbers, friends, social networks accounts, etc. You will also learn how to plot all of this information on a graph and use it to build smart attack strategies.
2. Generating Malware – Now that you gathered enough information about your target and came up with an attack strategy, the next step is to create custom malware that is attractive to the target. This section will teach you how to create backdoors, keyloggers, credential harvesters and more, these files will work on all operating systems (Windows, Apple Mac OS, Linux and Android). You’ll also learn how to enhance these files to make them bypass all anti-virus programs, and make them look and function just like any other file such as an image or a pdf, or even embed them in legitimate Microsoft Office documents.
3. Delivery Methods – Now that you have your custom-made trojan ready, in this section you will learn a number of social engineering techniques to deliver it to the target, you will learn how to create fake websites that look identical to websites the target trusts, send emails that appear like they’re send from trusted sources and use fake login pages and fake updates to hack the target. You’ll also learn advanced social engineering techniques to lure the target to visit your malicious website without even interacting with them.
4. Post Exploitation – In this section you will learn how to interact with the systems you compromised whether they use Windows, Linux, Apple Mac OS or even Android. You’ll learn how to access the file system (read/write/upload/execute), maintain your access, escalate your privileges, spy on the target, use the target computer as a pivot to hack other computers and more! If your target uses Android then you’ll also learn how to read their messages, find their location, access their other accounts (such as Whatsapp, Facebook, etc.) and more!
Finally at the end of the course you will learn how to protect yourself and your systems from these attacks.
With this course you’ll get 24/7 support, so if you have any questions you can post them in the Q&A section and we’ll respond to you within 15 hours.
Checkout the curriculum and the course teaser for more info!
Notes:
This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.
This course is totally a product of Zaid Sabih & zSecurity, no other organization is associated with it or a certification exam. Although, you will receive a Course Completion Certification from Udemy, apart from that NO OTHER ORGANIZATION IS INVOLVED.
What's included
- 12.5 hours on-demand video
- 1 article
- 17 downloadable resources
- Access on mobile and TV
- Certificate of completion