道德黑客-网络钓鱼攻击
Ethical Hacking-Phishing Attacks
- 1. Introduction
- 1. Introduction
- 2. Introduction to Phishing Attacks
- 2. Build Your Cybersecurity Lab
- 1. Lab Overview
- 2. Download and Install Vmware
- 3. Download and Install VirtualBox
- 4. Download and Install Kali Linux
- 5. Download and Install Metasploitable2
- 6. Download and Install Windows 11 VM
- 7. Installing Windows-2
- 8. Testing our Lab
- 3. Linux Essential
- 1. Navigating File System
- 2. Users and Priviledges-1
- 3. Users and Priviledges-2
- 4. Neworking Commands
- 5. Installing and Updating Tools
- 6. Controlling Kali Linux Services
- 7. Viewing, Creating and Editing Files
- 8. grep commands-1
- 9. grep commands-2
- 10. More Linux commands
- 11. More Commands
- 4. Practice Phishing attacks
- 1. Introduction to Phishing Attacks
- 2. Download and Install Phishing tools
- 3. Practice Facebook Phishing Attack
- 4. Practice Netflix Phishing attack
- 5. Practice Amazon Phishing Attacks
- 6. Download and Install another Phishing Tool
- 7. Detailed Information about Target Device Using Phishing Link
- 8. Phishing Link to hack the camera and Record Video
- 9. Phishing Link to Hack the camera and take pictures
- 10. Phishing Link to hack the microphone and Record Audio
- 11. Phishing link to get the target loction
- 12. Phishing Link for IP tarcker
- 5. Practice Phishing Attacks -2
- 1. Downlaod and Install Zphisher
- 2. Linkdin Phishing attack by Zphisher
- 3. Another Way for Linkdin Phishing Attack
- 4. Icloud Phishing Attack
- 5. Apple Phishing Attack
- 8. Snapchat Phishing attack
- 6. Introduction to gophish
- 1. Download and Install gophish
- 2. Explorer gophish