Learn Hacking Windows 10 Using Metasploit From Scratch
3.9 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
95 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Learn Hacking Windows 10 Using Metasploit From Scratch to your Wishlist.

Add to Wishlist

Learn Hacking Windows 10 Using Metasploit From Scratch

Become an ethical hacker, Hack Windows 10/8/7/Vista like Professionals, Secure them like Experts, Detect the Hackers
3.9 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
95 students enrolled
Created by Saad Sarraj
Last updated 7/2017
English
Curiosity Sale
Current price: $10 Original price: $195 Discount: 95% off
30-Day Money-Back Guarantee
Includes:
  • 8 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • More the 70 detailed video explains how to hack & secure any Windows OS
  • Learn Hacking Windows 10 /8.1/8/7/Vista like black hat hackers
  • Learn Securing Windows 10 /8.1/8/7/Vista like white hat hackers
  • Learn installing Kali Linux as VM & your main OS
  • Learn preparing your penetration testing lab
  • Learn Linux commands and how to interact with Terminal
  • Learn Linux basics
  • Gather information from any target
  • Learn how to use Nmap to gather information
  • Learn how to use Zenmap to gather information
  • Learn what is Metasploit
  • Learn using Metasploit like professionals
  • Learn using Msfvenom
  • Learn creating an undetectable payload
  • Learn combining your payload with any type of file
  • Learn creating an unsuspicious and undetectable backdoor
  • Learn spoofing the backdoor extention
  • Learn interacting with the compromised system via Meterpreter command line
  • Escalate your privileges
  • Persist your connection in the compromised system
  • Crack the administrator password
  • Capture the keystrokes of the compromised system
  • Learn What is Pivoting ? and pivot from the victim system to own every device on the network
  • Learn what is BeEF ? and how to use it
  • Hook any user browser with BeEF control panel
  • launch the best BeEF project modules in the target browser
  • Full control Windows OS of the hooked browser
  • Launch BeEF over WAN network
  • Learn the theory behind getting a reverse connection over WAN network
  • Launch all the previous attacks over WAN network
  • Learn port forwarding in the router
  • Learn Port forwarding using VPS SSH tunnel
  • Learn how to use VPN to hack over WAN network
  • Secure your Windows OS
  • Analyse your Windows OS like experts
  • Detect the Hack on your Windows OS
  • Learn advanced techniques to detect the backdoor
  • Detect the Hacker identity
View Curriculum
Requirements
  • Basic IT Skills
  • PC or Laptop
Description

Notice:

This Price is for the 1st 100 students, so it will go up after that.

in this course, you will start as a beginner without any previous knowledge about the hacking, the course focuses on the practical side and the theoretical side to ensure that you understand the idea before you apply it.

This course is intended for beginners and professionals, if you are a beginner you will start from zero until you become an expert level, and if you are a professional so this course will increase your knowledge about the hacking.

in this course you'll learn how the black hat hackers hacks Windows OS using advanced techniques, and also you'll learn how the white hat hackers Secure Windows OS by analyzing it, and how to detect the hackers identity.                                                                                                                                      

This course is divided to eight sections:

  1. Preparation: In this section, you will learn how to download and setup Kali Linux 2.0 properly as a virtual machine and also how to install it as your main OS, and you'll learn how to setup Windows 10 and Metasploitable as a virtual machine, this will help you to create your own safe Environment to perform any kind of attacks without harming your main OS.                                                                                                                                                                                                                      
  2. Information Gathering: After preparing your penetration testing lab, In this section you'll move to learn how to gather as much as possible of information from your target, because this will help you a lot to identify and determine your target and see the weaknesses in his OS.                                                                                                                                         
  3. Gaining Access: Now you'll start dealing with Metasploit framework by using msfconsole interface and how to use it like professionals, after that you will begin by creating a simple payload using msfvenom, and after that you'll learn how to create an encoded payload using an encoder from within msfvenom, and lastly you will learn how to have the full access of the target Windows OS by testing the Payload that we have created.                                                                                                                                                                                                                           
  4. Encoding and Combining the Payload: After learning how to deal with Metasploit framework and how to create a simple payload using msfvenom, now you will learn the advanced techniques to create an encoded payload that's undetectable from almost all the antiviruses, and also you'll learn how to spoof the backdoor extension and how to combine it with any kind of file whether it's an Image,PDF,MP3,EXE,Word,Excel file, and we learn all of this techniques to make your backdoor unsuspicious and convince the target to download and tun your backdoor.                                                                                                                                                                                                                                     
  5. Post Exploitation: After gaining the full access over the target OS in this section you'll will learn how to interact with the compromised system using Meterpreter command line and the best modules that you can run on the compromised system such as (Cracking the admin pass,persist your connection,escalate your privileges) and much more....                                                                                                                                                                                       
  6. Hooking with BeEF: in this section you'll learn what is BeEF Project how to hook and deal with any user from your BeEF control panel, and also you'll learn a very sophisticated methods to hook any client over the internet with your BeEF control panel, and even you'll be able to perform a very sophisticated attacks to get the full control of the target OS through BeEF.                                                                                                                                                                              
  7. Perform the previous attacks over WAN network: so far we seen how to perform all of the previous attacks in our LAN network,so in this section you'll learn how to perform it over WAN network, that's mean even if your target wasn't connected to your LAN network you'll be able to hack him, you'll start learning the theory behind hacking over the internet and how you can configure the router to get a reverse connection over WAN network, and then you'll learn other methods to get a reverse connection over WAN network and this is by using a VPN to hide your identity or you can port forward the reverse connection to your Kali machine by using VPS SSH tunneling.                                                                                                                                                             
  8. Protection & Detection: finally it's the time to learn how to detect any kind of the attacks that we've learned and how to prevent yourself and your Windows OS from it, so i this section you'll start by learning how to detect any kind of backdoor whether it's combined with an Image,exe,PDF file etc.... using more than method, and also you'll learn how to analyse your Windows OS like experts to check whether it's hacked or not, and lastly you'll learn how to prevent yourself from any kind of the attacks that we've learned.                                                                                                                                       

Notice: This course is only for the educational purposes and all the attacks that have been carried out are in my own Penetration testing lab and against my own devices.

  • these Attacks works against any Windows OS whether it's  Windows 10/8.1/8/7/Vista etc....
  •  You must practice what you've learned to become an advanced level, because this course focuses on both practical and theoretical side. 
  • This course is going to be always up to date.
  • This course is only for Ethical purposes.
  • All the videos are downloadable.
  • If you have any question or any problem, you can send a message to me and i'll be glad to response.
  • After finishing this course, you will get a certificate directly from Udemy.
  • All the people who enrolled in this course will get discounts for future courses.
  • All the Rights are Reserved to iSecurityPro no other Organization is involved.



Who is the target audience?
  • Anyone wants to become an Ethical Hacker/Penetration tester
  • Anyone who wants to learn how black hat hackers hacks the operating systems
  • Anyone who wants to learn how white hat hackers secure the operating systems
Students Who Viewed This Course Also Viewed
Curriculum For This Course
72 Lectures
07:52:00
+
Introduction
1 Lecture 02:20
+
Preparing
8 Lectures 26:21

In this video you'll learn what is Kali Linux and what is used for and also you'll learn how to install Kali Linux as your main operating system properly.

Installing Kali Linux 2.0 as ISO image
06:10

After learning how to install Kali Linux 2.0 as your main operating system, in this video you'll learn how to install Kali as a virtual machine using (VirtualBox), so you'll be able to create your own save Environment and prevent your host machine from any damage could happen. 

Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox)
04:52

In this video you'll learn how to install Kali Linux as a virtual machine using VMware workstation, this will help you to create your own save Environment and prevent your host machine from any damage could happen. 

Installing Kali Linux 2.0 as a Virtual Machine (VMware)
02:37

In this video you'll be able to setup your windows environment properly without any issues, because in the future videos we are going to use it in many scenarios as the victim operating system.

Setup Windows 10 as a Virtual Machine
02:28

The last machine we are going to setup is Metasploitable, and Metasploitable basically is a vulnerable Linux machine, and we are going to be using Metasploitable in many scenarios in the future videos, 

Preview 02:24

If you chose VirtualBox software to run your Virtual Machines you could face some network problems, this video will show you how to configure the network settings of all the installed Virtual Machines.

Configure the Network Settings
04:46

Before we get started into Hacking i am going to show you how to connect your external WiFi adapter to your virtual machine, and the best WiFi adapters that you can use.

Connecting Wi-Fi card to the Virtual Machine
01:29

The first thing you need to do before using Kali Linux is updating your Kali Linux 2.0 resources list and upgrade all the tools that comes with Kali Linux, this will ensure that you use the last version of all the installed tools on Kali Linux

Updating Kali Linux
01:35
+
Information Gathering
5 Lectures 33:10

In this section you'll learn how to gather as much as possible of information from your target, because this will help you a lot to identify your target and see the weaknesses in his OS.

Introduction
01:21

In this lecture you'll learn how to discover the clients that are connected to your network, and this will help you to identify your target and get the target internal IP address to scan it later using NMAP tool.

Preview 04:13

Now it's time to scan your target using NMAP, and NMAP is the best tool to gather information from almost any OS, so in this lecture you'll learn how to discover the open ports of the target OS and the most commonly used commands with NMAP.

Scanning the target OS (Part 1)
13:11

In this lecture we will continue using NMAP, and you'll learn how to detect the operating system that's installed on the target machine, and how to scan a range of ports and IP addresses and how to use NMAP like professionals.

Scanning the target OS (Part 2)
08:19

After learning how to use NMAP through the command line, in this lecture you'll learn how to use the GUI of NMAP that's called Zenmap, Zenmap provides an advanced features for experienced Nmap users, so in this lecture you'll learn how to perform a sophisticated scan for the target device.

Scanning the target OS using GUI
06:06
+
Gaining Access
5 Lectures 33:02

In this short video i am going to talk about the topics that we are going to learn in this section.

Gaining Access introduction
01:03

In this lecture you'll learn what is Metasploit framework ? and who uses it ? 

and also you'll learn dealing with Metasploit like experts, and you'll learn the most commonly useful commands that you can use with Metasploit to achieve your goal.

Metasploit Fundamentals
12:29

After learning what is Metasploit, now we will move to learn how to deal with msfvenom tool which is a part of Metasploit framework, so in this lecture you'll learn how to create a simple Payload using msfvenom.

Creating a Payload using Msfvenom
06:05

In the previous video we learned how to create a simple payload using msfvenom, but in this lecture i am going to show you how to create an encoded payload using some of the available encoders that comes by default with Metasploit to make your payload undetectable against the Anti-Viruses.

Creating an Encoded Payload using Msfvenom
05:59

After learning how we can create an encoded payload using Msfvenom, in this lecture you'll learn how to set a listener to listen for the incoming connections, and we are going to be testing our encoded payload that we have created in the target OS.

Testing the Payload in the target OS
07:26
+
Encoding and Combining the Payload
8 Lectures 54:55

In this lecture i just wanted to talk about what we are going to learn from this section and why this section is important to continue the course.

Introduction
00:47

In this lecture you'll learn how to install Veil-Framework on your Kali machine, and basically veil framework is a very popular tool to create an undetectable payloads against the Anti-Viruses.

Installing Veil Framework
03:38

In this lecture you'll learn how to create an undetectable payload from almost all the Anti-Viruses this done by using Veil Evasion tool that will generate an encoded payload.

Creating an undetectable Payload
07:45

In this lecture you'll learn how to combine your payload with an executable file, this is by using Veil Evasion tool and this will help you to make your payload unsuspicious by the target user.

Combine an EXE file with the Payload (1st method)
08:39

In this lecture you are going to learn another method to combine your payload with any exe file, this done by using another tool allows us to do that, so once the target run your backdoor the combined exe file will run without any issues and at the same time your payload in the background of the target OS and you will get a reverse connection.

Combine an EXE file with the Payload (2nd method)
05:58

In this lecture we are going step further and this is by combining our payload with any kind of file whether it's PDF,MP3,Image etc...

Combine the Payload with an Image,PDF,MP3 etc....
11:40

In this lecture you'll learn how to combine your payload with any Excel or Word file, this done by generating an undetectable payload using Veil Evasion and then converting it to Macro code and after that we will inject it into the doc or the excel file and once the user run it you will get a reverse connection.

Combine the Payload with an Excel, Word file
09:19

After learning how to combine our payload with any type of files, in this lecture you'll learn how to spoof the extension of the backdoor by using a type of character that allows us to do that.

Spoofing the Backdoor extension
07:09
+
Post Exploitation
22 Lectures 02:55:41

In this short video i will give you a quick overview of what you are going to learn from this section.

Preview 00:54

In this lecture you'll learn a very important commands to interact with the target OS once you have the full access of his Windows OS.

Interact with the Target Computer (Part 1)
06:29

this video is the complement of the previous video about interacting with the compromised system via meterpreter command line.

Interact with the Target Computer (Part 2)
06:11

After having the full access over the target OS it's very important to learn how you can persist your connection into the target OS because this will ensure you to get a reverse connection every time the target restarts his OS.

Persist your connection in the target OS
07:46

In this lecture you'll learn how you can escalate your privileges on the target OS, this is very important because many of the modules that we are going to explain it in the next lectures needs the administrator privileges.

Escalate your privileges in Windows 10
07:22

Another method to escalate your privileges on the target OS, this is very important because many of the modules that we are going to explain it in the next lectures needs the administrator privileges.

Escalate your privileges in Windows 8.1/8/7
05:18

In this lecture you'll learn how to migrate your backdoor with any system process running in the target OS, so even if the target tried to analyse the processes he will not see your running backdoor because it's already migrated with another process.

Migrating the Backdoor with the running processes
07:53

In this lecture you'll learn how to check whether the compromised OS is a virtual machine or not, and you'll learn how to clear the Application, System, and Security logs on a Windows system.

Check the virtualization & Clear log event
05:54

In this lecture you'll learn how you can uninstall any kind of the installed software and programs on the target OS by using windows command shell.

Uninstalling programs from the target OS
05:18

In this lecture you'll learn how to add/delete any user on the compromised system by using windows command shell and even how to change/delete the password of administrator account.

Add/Remove users and changing the Admin password
05:55

In this lecture you'll what is pivoting and how it can be used to compromise the other devices that are connected to same network of the compromised system network.

What is Pivoting?
10:44

In this lecture we will demonstrate the pivoting from the victim system to own the other devices that are connected to the same network of the compromised system network.

Pivot from the Victim System to Own Every Device on the Network (1st Case)
10:35

Now we will demonstrate the 2nd case of pivoting from the victim system to own the other devices that are connected to the same network of the compromised system network.

Pivot from the Victim System to Own Every Device on the Network (2nd Case)
12:24

In this lecture you are going to learn a very useful module allows you to steal the password of the WiFi AP that the compromised system is connected to, this will be very handy because once you steal the WiFi password you'll be able to connect to it and perform MITM attacks.

Stealing the target Wi-Fi password
08:05

In this lecture you'll learn how you can capture the keystrokes of the compromised system, this done by injecting a keylogger in the victim OS, this will help you to capture any kind of information whether it's an Email, Passwords, chat etc.... 

Preview 06:57

In this lecture you'll learn how to steal Windows Username and Password, this done by popping up a small window ask to the victim to enter his Windows password to open a certain program.

Stealing Windows credentials
06:33

Here is another method to get the administrator Password of the victim OS, this done by cracking the hash of the administrator password using John the Ripper tool.

Cracking the administrator password
08:47

In this lecture you'll be able to steal multiple password from the victim whether it's WiFi pass, saved passwords in the target browser and much more, this done by using a small program allows you to do that.   

Stealing the stored passwords & Visited websites
09:50

In this lecture you'll learn how you can recover any type of the deleted files from the victim OS, this done by using a Metasploit module allows you to do that.

Recover the deleted files from the target OS
08:01

In this short lecture i am going to show you how you can enumerate all the connected USB flash drives from the victim OS, this will be useful to gather some information about the victim machine.

Enumerate USB Drive history
02:19

In this lecture i am going to show you how you can redirect the victim OS from to any website, so you can redirect him to a page that have a malicious files or to a fake page to steal a certain online account.

Redirect the target from to any website
16:13

In this lecture you'll learn how to download any type of file on the target OS by using Windows PowerShell, this will be very handy because if you have a windows PowerShell session you can upgrade this session to a Meterpreter session by downloading and running a malicious file gives you a Meterpreter session.

Downloading files using Windows PowerShell
16:13
+
Hooking with BeEF
10 Lectures 01:07:00

In this short introduction i am going to give you an overview of what we are going to learn in this section

Introduction
00:54

In this lecture you'll learn the theory behind hooking with BeEF and i am going to show you to methods allows you to hook any browser you want with BeEF

Hooking the target browser with BeEF
12:04

In this lecture you'll learn how to play a sound in the target browser using a BeEF module, then you'll learn how to change this sound to any sound you want.

Play any sound in the target browser
09:28

In this short lecture you'll learn how to take a screenshot of the hooked client.

Preview 02:46

In this lecture you'll learn how to redirect the hooked browser to any website you want, so you can redirect your target to a fake page to hack a certain online account, or have the full access of his OS by redirecting him to a page that includes a malicious file.

Redirect the target to any website
05:44

In this lecture you'll learn how to redirect the hooked browser to any YouTube video you want.

Run any YouTube video in the target browser
04:20

In this lecture you'll learn how to steal the credentials of the target accounts, this done by popping up a window asks the victim to enter his account credentials because the session of his account has been expired and once he enter his credentials you will get the information on BeEF control panel, or you can simply redirect the target to phishing page.

Stealing the target online accounts with BeEF
05:48

In this lecture you'll learn how to integrate Metasploit framework exploits with BeEF project, this will help you a lot to hack the full OS of the hooked browser if there is any available vulnerability.

Preview 08:31

In this lecture you'll learn how to full control the OS of the hooked browser, this done by showing the target a fake flash update and once the victim download and run the update we will get a reverse connection to our Kali machine.

Hacking the target Windows OS through the hooked browser
08:58

In this lecture you'll learn some funny BeEF modules that you can run in the target browser such as starting a chat with the hooked client and replace the content and much more....

Having some fun with BeEF
08:27
+
Perform the previous attacks over WAN Network
5 Lectures 36:20

In this short lecture i am going to talk about the topics that we are going to learn in this section.

Preview 01:17

In this lecture you'll learn the theory behind the reverse connection over WAN network, and how to configure the router to forward the incoming connection through a certain port from your router to your Kali machine.

Configuring the router and port forwarding (1st method)
09:16

In this lecture you'll learn how to configure your payload to run over the internet, this will allow you to compromise any Windows OS that's connected to the internet.

Configure the Backdoor
05:29

Here is another method to get a reverse connection over the internet and hide your identity by using a VPS to redirect the connections to your Kali Linux machine.

Port forwarding using VPS SSH tunnel (2nd method)
14:26

In this lecture you'll learn how to hook the browsers using BeEF over WAN network, this will be very simple, you only have to change the IP of JavaScript code that will be injected and you are ready to go.

Configure BeEF over WAN network
05:52
+
Protection & Detection
8 Lectures 43:11

In this lecture you'll be able to detect any Meterpreter session on your Windows OS, and this is by using a simple program that's able to detect the backdoor and it's PID and kill the session immediately.

Detect & Kill any Meterpreter session
06:14

We seen in a previous lectures how we can hide our backdoor in the target OS after fully control his OS. In this lecture you'll learn some techniques helps you to detect the running backdoor on your windows OS manually without using any tools.

Detect the running backdoor manually
09:59

In this lecture you'll learn some techniques could help you to check whether the suspicious file is a malicious file or not and this will be manually without using any tool.

Detecting the combined backdoor with an image,pdf etc...
01:46

In this lecture you'll learn how to detect the backdoor that's combined with an executable file and this is by comparing the original EXE file hash with the suspicious file hash.

Detecting the combined backdoor (MD5 hash)
04:22

In this lecture you'll add an additional protection layer to your Windows OS, and this is by encrypting the keystrokes,even if the hacker compromised your windows machine he'll not be able to capture the keystrokes.

Encrypting your keyboard keystrokes
05:54

In this video you'll be able to Analyse the network connections to check whether your Windows OS is compromised or not, and you'll be able to get the IP address of the hacker.

Analyzing the network connections
06:38

In this lecture you'll learn how to analyse all the running processes in the background of your Windows OS, this is by using a light program will analyse all the processes and give you a full report of it. 

Analyze the running processes
04:03

In this lecture you'll learn how to detect the suspicious file to check whether it's clean or it's combined with a backdoor, this done by using a sandbox that will analyse your suspicious file and then it will give you a full report of it.

Detecting the backdoor using a Sandbox
04:15
About the Instructor
Saad Sarraj
4.1 Average rating
60 Reviews
660 Students
3 Courses
Ethical Hacker, IT Expert

My Name is Saad Sarraj , i am a young Ethical Hacker who is trying to keep the things secure.I have a very good Experience in penetration testing and Ethical Hacking, i started in this field since 2012 , then i have created my own website (iSecurityPro) and started making videos on my YouTube channel which includes many tips and tricks about Linux OS and Windows OS , i am always focusing on the practical side in producing videos and also the theory behind every single attack , and  i am trying to share my experience with you from what i learned before .