Udemy - Practical Hacking: Undetectable Malware

seeders: 34
leechers: 6
updated:
Added by tutsnode in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 426
  • Language: English

Files

Practical Hacking Undetectable Malware [TutsNode.com] - Practical Hacking Undetectable Malware 08 How to Defend Malware Attacks
  • 023 How to Defend Malware Attacks.mp4 (34.7 MB)
  • 023 01-How-to-Defend.pdf (938.9 KB)
  • 023 How to Defend Malware Attacks.en.srt (2.5 KB)
01 Introduction
  • 001 Introduction.en.srt (1.7 KB)
  • 001 Introduction.mp4 (17.0 MB)
  • 002 02-Course-Out-Line.pdf (1.1 MB)
  • 002 Course Out Line.en.srt (2.0 KB)
  • 002 Course Out Line.mp4 (3.8 MB)
  • 003 03-Prerequisite.pdf (1.0 MB)
  • 003 Prerequisite.en.srt (1.7 KB)
  • 003 Prerequisite.mp4 (3.7 MB)
02 MetaSploit Crash Course
  • 004 Introduction to Metasploit framework.en.srt (1.0 KB)
  • 004 Introduction to Metasploit framework.mp4 (1.6 MB)
  • 005 Setup Metasploit in Kali Linux.en.srt (1.8 KB)
  • 005 Setup Metasploit in Kali Linux.mp4 (6.0 MB)
  • 006 Exploit and Payloads.en.srt (4.1 KB)
  • 006 Exploit and Payloads.mp4 (12.0 MB)
  • 007 02-MetaSploit-Crash-Course.pdf (1.0 MB)
  • 007 Simple Payload Creation using Metasploit and test it on no-distribute.en.srt (4.1 KB)
  • 007 Simple Payload Creation using Metasploit and test it on no-distribute.mp4 (9.1 MB)
  • 008 Test Payload on Windows.en.srt (1.8 KB)
  • 008 Test Payload on Windows.mp4 (3.3 MB)
03 Introduction to Veil 3.0 Framework
  • 009 03-Introduction-to-Veil-3.0-Framework.pdf (1.0 MB)
  • 009 Introduction to Veil 3.0.en.srt (0.8 KB)
  • 009 Introduction to Veil 3.0.mp4 (941.3 KB)
  • 010 Installation of Veil 3.0.en.srt (4.0 KB)
  • 010 Installation of Veil 3.0.mp4 (19.7 MB)
04 Create Payload with Veil 3.0
  • 011 04-Create-Payload-with-Veil-3.0.pdf (1.1 MB)
  • 011 Simple Payload Creation with Veil.en.srt (11.4 KB)
  • 011 Simple Payload Creation with Veil.mp4 (24.3 MB)
  • 012 Advance Payload Creation with Veil Part 1.en.srt (6.3 KB)
  • 012 Advance Payload Creation with Veil Part 1.mp4 (23.8 MB)
  • 013 04-Create-Payload-with-Veil-3.0.pdf (1.1 MB)
  • 013 Advance Payload creation with Veil Part 2 (Encoder and BadChars).en.srt (3.7 KB)
  • 013 Advance Payload creation with Veil Part 2 (Encoder and BadChars).mp4 (8.1 MB)
05 Payload Binding Methods
  • 014 05-Payload-Binding-Methods.pdf (1.0 MB)
  • 014 Installing Py2exe on Windows.en.srt (4.2 KB)
  • 014 Installing Py2exe on Windows.mp4 (15.2 MB)
  • 015 Py2Exe to Compile Payload on Windows.en.srt (6.8 KB)
  • 015 Py2Exe to Compile Payload on Windows.mp4 (18.1 MB)
  • 016 05-Payload-Binding-Methods.pdf (1.0 MB)
  • 016 Binding Payload with jpg.en.srt (5.2 KB)
  • 016 Binding Payload with jpg.mp4 (22.0 MB)
  • 017 Change exe Extension to jpg.en.srt (4.2 KB)
  • 017 Change exe Extension to jpg.mp4 (9.2 MB)
06 Launch an Attack
  • 018 06-Launch-an-Attack.pdf (1.9 MB)
  • 018 Port Forwarding.en.srt (2.8 KB)
  • 018 Port Forwarding.mp4 (5.7 MB)
  • 019 Attack on WAN.en.srt (4.1 KB)
  • 019 Attack on WAN.mp4 (12.3 MB)
07 Post Attack and Persistence Connection
  • 020 07-Bonus-Lectures.pdf (1.0 MB)
  • 020 Post Attack Usage of Meterpreter Part 1.en.srt (3.9 KB)
  • 020 Post Attack Usage of Meterpreter Part 1.mp4 (21.8 MB)
  • 021 Post Attack Usage of Meterpreter Part 2.en.srt (2.7 KB)
  • 021 Post Attack Usage of Meterpreter Part 2.mp4 (15.0 MB)
  • 022 07-Bonus-Lectures.pdf (1.0 MB)
  • 022 Persistence connection.en.srt (4.8 KB)
  • 022 Persistence connection.mp4 (21.2 MB)
09 Bonus Section
  • 024 Bonus Lecture.en.srt (2.8 KB)
  • 024 Bonus Lecture.mp4 (20.1 MB)
  • 024 Bonus-Section-Dec20.html (9.7 KB)
  • TutsNode.com.txt (0.1 KB)
  • [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)

Description


Description

In this course we will create undetectable malware and try to gain access to systems which are Up-to-date and fully patched then we will see how we can bind payloads with different files after doing that we will see how we can hack systems which are outside of our network and anywhere in the world. Then we will see the 4th phase of hacking “maintaining access” and see how we can maintain access to systems. After watching this course you will be able to create malware’s that can bypass any antivirus and firewall. We will also see how to defend against these types of malware’s.
Who this course is for:

Ethical Hackers who already have done Basic Hacking Course
Ethical Hackers who wants to learn Advance Hacking Techniques
Ethical Hackers who wants to learn Practical Hacking
Ethical Hackers who wants to learn about How to bypass up-to-date antivirus software’s
Ethical Hackers who wants to advance their knowledge in payload creation

Requirements

Basic Knowledge of Hacking done some Beginner Hacking Course
Knowledge of Basic Linux Commands
Knowledge of Kali Linux
Basic Knowledge of Metasploit
Basic Knowledge of Exploit and Payload

Last Updated 12/2020



Download torrent
342 MB
seeders:34
leechers:6
Udemy - Practical Hacking: Undetectable Malware


Trackers

tracker name
udp://inferno.demonoid.pw:3391/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker.opentrackr.org:1337/announce
udp://torrent.gresille.org:80/announce
udp://glotorrents.pw:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.pirateparty.gr:6969/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://9.rarbg.to:2710/announce
udp://shadowshq.yi.org:6969/announce
udp://tracker.zer0day.to:1337/announce
µTorrent compatible trackers list

Download torrent
342 MB
seeders:34
leechers:6
Udemy - Practical Hacking: Undetectable Malware


Torrent hash: 97AA401165E3E9A1F1ED9A85A424ADF33B933DB9