Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Software Development Tools No-Code Development
Business
Entrepreneurship Communication Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certifications Network & Security Hardware Operating Systems & Servers Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Paid Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement & Gardening Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition & Diet Yoga Mental Health Martial Arts & Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Learning Teacher Training Test Prep Other Teaching & Academics
Web Development JavaScript React Angular CSS Node.Js PHP HTML5 Vue JS
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS Cisco CCNA Microsoft AZ-900 CompTIA Security+
Microsoft Power BI SQL Tableau Data Modeling Business Analysis Business Intelligence MySQL Qlik Sense Data Analysis
Unity Unreal Engine Game Development Fundamentals C# 3D Game Development C++ Unreal Engine Blueprints 2D Game Development Blender
Google Flutter iOS Development Android Development Swift React Native Dart (programming language) Kotlin Mobile App Development SwiftUI
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting Canva InDesign Character Design Procreate Digital Illustration App
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Life Purpose Mindfulness Sound Therapy Meditation Emotional Intelligence
Business Fundamentals Entrepreneurship Fundamentals Freelancing Business Strategy Startup Business Plan Online Business Blogging Leadership
Digital Marketing Social Media Marketing Marketing Strategy Google Analytics Internet Marketing Email Marketing Copywriting YouTube Marketing Startup

IT & SoftwareNetwork & SecurityMetasploit

Learn Hacking Windows 10 Using Metasploit From Scratch

Become an Ethical Hacker. Hack Windows 10/8/7/Vista like Professionals, Secure them like Experts, Detect the Hackers
Rating: 4.3 out of 54.3 (451 ratings)
3,789 students
Created by Saad Sarraj
Last updated 12/2021
English
English [Auto]

What you'll learn

  • More the 90 detailed video explains how to hack & secure any Windows OS
  • Learn Hacking Windows 10 /8.1/8/7/Vista like black hat hackers
  • Learn Securing Windows 10 /8.1/8/7/Vista like white hat hackers
  • Learn installing Kali Linux as VM & your main OS
  • Learn preparing your penetration testing lab
  • Learn Linux commands and how to interact with Terminal
  • Learn Linux basics
  • Gather information from any target
  • Learn how to use Nmap to gather information
  • Learn how to use Zenmap to gather information
  • Learn what is Metasploit
  • Learn using Metasploit like professionals
  • Learn using Msfvenom
  • Learn creating an undetectable payload
  • Learn combining your payload with any type of file
  • Learn creating an unsuspicious and undetectable backdoor
  • Learn spoofing the backdoor extention
  • Learn interacting with the compromised system via Meterpreter command line
  • Escalate your privileges
  • Persist your connection in the compromised system
  • Crack the administrator password
  • Capture the keystrokes of the compromised system
  • Learn What is Pivoting ? and pivot from the victim system to own every device on the network
  • Learn what is BeEF ? and how to use it
  • Hook any user browser with BeEF control panel
  • launch the best BeEF project modules in the target browser
  • Full control Windows OS of the hooked browser
  • Launch BeEF over WAN network
  • Learn the theory behind getting a reverse connection over WAN network
  • Launch all the previous attacks over WAN network
  • Learn port forwarding in the router
  • Learn Port forwarding using VPS SSH tunnel
  • Learn how to use VPN to hack over WAN network
  • Secure your Windows OS
  • Analyse your Windows OS like experts
  • Detect the Hack on your Windows OS
  • Learn advanced techniques to detect the backdoor
  • Detect the Hacker identity

Requirements

  • Basic IT Skills
  • PC or Laptop

Description

In this course, you will start as a beginner without any previous knowledge about hacking. The course focuses on the practical and theoretical sides to ensure that you understand the attack before performing it.

This course is intended to be for beginners and professionals. If you are a beginner, you will start from zero until you become an expert. If you are a professional, this course will increase your knowledge about hacking.

In this course, you'll learn how black hat hackers hack Windows OS using advanced techniques. In addition to that, you'll learn how white hat hackers Secure Windows OS by analyzing the malicious files and how to detect the hacker's identity.


This course is divided into eight sections:

  1. Preparation: In this section, you will learn how to download and set up the latest version of Kali Linux as a virtual machine or as your main OS properly. Furthermore, you'll learn how to set up Windows 10 and Metasploitable as virtual machines. This helps you create your safe Hacking Environment to perform any kind of attack without harming your main OS.


  2. Information Gathering: After you set up your penetration testing lab, In this section, you'll go through learning how to gather as much information as possible about your target. This helps you a lot to identify and determine your target and see the weaknesses in the target OS.


  3. Gaining Access: In this section, you'll start learning Metasploit Framework from scratch. After that, you'll learn how to create basic and encoded payloads using the msfvenom tool. Lastly, you will learn how to gain full access to a Windows OS by launching the Payload that we have created.


  4. Encoding and Combining the Payload: After learning how to use Metasploit Framework, and how to create basic payloads using msfvenom, it's time to start learning advanced techniques on creating an encoded payload that's undetectable by most of the antiviruses. In addition to that, you'll learn how to spoof the backdoor extension and combine it with any kind of file, whether it's an image, PDF, MP3, EXE, Word, or Excel file. This will help to make your backdoor unsuspicious to the target to download and run your backdoor.


  5. Post Exploitation: After gaining full access to the target OS, in this section, you'll learn how to interact with the compromised system using Meterpreter command line. You'll also learn how to run post-exploitation modules on the compromised system such as (Cracking the admin password, persisting your connection, escalating your privileges) and many more...


  6. Hooking with BeEF: In this section, you'll learn what BeEF Project is and how to hook any user to your BeEF control panel. You'll learn sophisticated methods to hook any client over the internet with your BeEF control panel. You'll even be able to perform sophisticated attacks to gain full access to the target OS by using BeEF.


  7. Perform the previous attacks over WAN network: In this section, you'll learn how to perform all the previously explained attacks over WAN network. This means, even if your target isn't connected to our LAN network, we'll be able to compromise the machine. You'll learn methods to get a reverse connection over WAN network like (configuring the router, VPS SSH tunneling, and NGROK).


  8. Protection & Detection: Finally, it's time to learn how to detect all attacks that we learned. In this section, you'll learn how to prevent your Windows OS from all the explained attacks, and how to detect any kind of backdoor whether it's embedded with an image, EXE, PDF file. In addition, you'll learn how to analyze your Windows OS like experts to see whether it's hacked or not.


Notice: This course is only for educational purposes and all the attacks that have been carried out are in my own Penetration testing lab and against my own devices.


  • These Attacks work against any Windows OS whether it’s Windows 11/10/8.1/8/7/Vista etc...

  • You must practice what you've learned to become an advanced level because this course focuses on both the practical and theoretical sides.

  • This course is going to be always up-to-date.

  • All the videos are downloadable.

  • If you have any questions, you can send a message to me, and I'll be glad to respond.

  • After finishing this course, you will get a certificate directly from Udemy.

  • All the people who enrolled in this course will get discounts for future courses.

  • All the Rights are Reserved to Saad Sarraj no other Organization is involved.


Who this course is for:

  • Anyone wants to become an Ethical Hacker/Penetration tester
  • Anyone who wants to learn how black hat hackers hacks the operating systems
  • Anyone who wants to learn how white hat hackers secure the operating systems

Instructor

Saad Sarraj
Ethical Hacker | TryHackMe Top 1% CTF Player
Saad Sarraj
  • 4.1 Instructor Rating
  • 1,257 Reviews
  • 11,753 Students
  • 4 Courses

I am a CyberSecurity and Ethical Hacking/Penetration Testing passionate. I am also a TryHackMe Top 1% CTF Player.

I created the courses to share what I learned. I try to make videos in a very simple way so that everyone learning Penetration Testing / Cybersecurity gets the advantage and understands easily.

I have a YouTube channel called CyberSudo that focuses on CyberSecurity and penetration testing. It also contains some videos from the courses.

If that sounds like something that could help you grow and learn more about CyberSecurity, then make sure to join me.


"WE ALL RISE BY LIFTING OTHERS"

Top companies choose Udemy Business to build in-demand career skills.
NasdaqVolkswagenBoxNetAppEventbrite
  • Udemy Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Investors
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Accessibility statement
Udemy
© 2022 Udemy, Inc.