Hacking tutorial: Undetectable Payloads
4.5 (18 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,331 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Hacking tutorial: Undetectable Payloads to your Wishlist.

Add to Wishlist

Hacking tutorial: Undetectable Payloads

Improve your skill in ethical hacking and learn how create your own payloads like a professional by easy way.
4.5 (18 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,331 students enrolled
Created by Kamil Vizy
Last updated 8/2016
English
Current price: $10 Original price: $50 Discount: 80% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • 3 Articles
  • 3 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • can to know how use few specific programs for generating payloads according your own options
  • can transfer the acquired knowledge into practice immediately after the end of the course
  • can test and improve security level in companies, institutions and etc.
View Curriculum
Requirements
  • students should have at least a basic knowledge of computer use, Kali Linux basics like few basic commands for deleting, folder creating, updating ,upgrading and installing and basics VM Virtualbox
Description

This course is designed for beginners and everyone who want to know how can make your own undetectable payload on 100% and what programs can be used for this purpose and what all needs for making a undetectable payload.

Just step by step, I will explain how to use the programs capabilities. I will show you some technics how u can make undetectable payload for penetration testing or research, how can inject payload into executable program and etc.

The course includes:

- explanation for each program which we will use
- preparation and installation VM VirtualBox, Kali Linux 2016.1 and test computer (victim)
- preparation and installation Veil-Evasion, Veil- Ordnance, Winpayloads, Shellter and basic use msfcomsole.

Course is designed very simply and easy everyone will be able to understand how can use programs and how can make different payloads in it.

If you take this course you will be able to make undetectable payload in 5 minutes and you can grow up in experience with penetration testing more faster. This informations from course you can use for testing security level in companies and institutions, do research and can help provide better security in companies and etc. It is a important part of hacking and you must know this part if you want to be a professional hacker/pentester.

Who is the target audience?
  • This course is for students who need to know more about creating your own payloads. In this course I describe four programs which we can use for making undetectable payloads.
Compare to Other Ethical Hacking Courses
Curriculum For This Course
12 Lectures
01:26:05
+
Install and setup working environment
3 Lectures 00:18
Setup VM Virtualbox
00:06

Setup Kali linux 2016.1 in Virtualbox
00:06

Setup testing version of Windows 7
00:05
+
Making payloads, Veil-Evasion, Veil-Ordnance, Shellter, WinPayloads
9 Lectures 01:25:47



Veil-Evasion
17:46

Veil-Ordnance part 1
14:37

Veil-Ordnance part 2
10:40

Shellter, PE Injector
15:57

WinPayloads, automatic payload creator, part 1
05:44

WinPayloads, automatic payload creator, part 2
10:22
About the Instructor
Kamil Vizy
4.0 Average rating
37 Reviews
2,548 Students
2 Courses
IT consultant and software tester

I'm started my IT career as product manager and IT consultant. I was working for IT company for 8 years and now i'm self employed and I offer to IT companies complete consulting services about software and hardware. Before one and a half year back i'm started devote ethical hacking to improve customer service. 

I ' m graduated from the Certified Training at 2015:

Network security - Hacking on practice - GOC3-20151000162 

For the future, I will want devote more and more ethical hacking and penetration testing by using black hat technique. Companies and our customers need to be prepared against attack from shadow.