Social Engineering & Phishing Mastery
Navigation X

[Big Banner Ad Space Available]
[Big Banner Ad Space Available]

Social Engineering & Phishing Mastery

posted by Sauron and Last Post: 21 days ago


PENTESTING  Social Engineering & Phishing Mastery  4456
lokimli Member
13
Posts
0
Threads
Member
#11
goood
Reply
ckckckf Member
41
Posts
0
Threads
Member
#12
(10 months ago)Sauron Wrote:
You’ll learn how attackers gather information on their targets and what information available online is useful for them.
You’ll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
You’ll also cover best practices for reporting and discover how to use what you’ve learned on this course to protect the cybersecurity infrastructure of your company or organization.

Course syllabus
This hands-on, interactive 1 Day Social Engineering & Phishing Mastery Course consists of 4 Modules packed with useful and current information directly from the field that will prepare you for any possible cyber threat.
  • Module 1: Reconnaissance
    • 1. Preparing phishing campaigns
    • 2. Open Source Intelligence (OSINT)
    • 3. Google hacking and search engines
    • 4. Targeted phishing and social media
Module 2: Infrastructure preparation
  • 1. Command and Control (C2)
  • 2. Stealth Communication
  • 3. Setting up DNS and certificates
  • 4. Credential harvesting with Evilginx2
  • 5. Automating mass-mailing
  • 6. Securing your Red Team infrastructure
Module 3: Payload preparation
  • 1. Malicious VBA macros
  • 2. Malicious XLM macros
  • 3. Living off the Land Binaries and Scripts
  • 4. Multi-stage malware
  • 5. Persistency techniques and attacks on supply chain
  • 6. Fileless malware
  • 7. Utilizing malicious hardware tools
Moudle 4: Lessons learned and reporting
  • 1. Measuring campaign results
  • 2. Measuring campaign results
  • 3. Protecting your organization


Password:leakforum.io

Reply
CalebMaria Member
41
Posts
0
Threads
Member
#13
(10 months ago)Sauron Wrote:
You’ll learn how attackers gather information on their targets and what information available online is useful for them.
You’ll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
You’ll also cover best practices for reporting and discover how to use what you’ve learned on this course to protect the cybersecurity infrastructure of your company or organization.

Course syllabus
This hands-on, interactive 1 Day Social Engineering & Phishing Mastery Course consists of 4 Modules packed with useful and current information directly from the field that will prepare you for any possible cyber threat.
  • Module 1: Reconnaissance
    • 1. Preparing phishing campaigns
    • 2. Open Source Intelligence (OSINT)
    • 3. Google hacking and search engines
    • 4. Targeted phishing and social media
Module 2: Infrastructure preparation
  • 1. Command and Control (C2)
  • 2. Stealth Communication
  • 3. Setting up DNS and certificates
  • 4. Credential harvesting with Evilginx2
  • 5. Automating mass-mailing
  • 6. Securing your Red Team infrastructure
Module 3: Payload preparation
  • 1. Malicious VBA macros
  • 2. Malicious XLM macros
  • 3. Living off the Land Binaries and Scripts
  • 4. Multi-stage malware
  • 5. Persistency techniques and attacks on supply chain
  • 6. Fileless malware
  • 7. Utilizing malicious hardware tools
Moudle 4: Lessons learned and reporting
  • 1. Measuring campaign results
  • 2. Measuring campaign results
  • 3. Protecting your organization


Password:leakforum.io

Reply
ronnyop2 Junior Member
10
Posts
0
Threads
Junior Member
#14
(10 months ago)Sauron Wrote:
You’ll learn how attackers gather information on their targets and what information available online is useful for them.
You’ll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
You’ll also cover best practices for reporting and discover how to use what you’ve learned on this course to protect the cybersecurity infrastructure of your company or organization.

Course syllabus
This hands-on, interactive 1 Day Social Engineering & Phishing Mastery Course consists of 4 Modules packed with useful and current information directly from the field that will prepare you for any possible cyber threat.
  • Module 1: Reconnaissance
    • 1. Preparing phishing campaigns
    • 2. Open Source Intelligence (OSINT)
    • 3. Google hacking and search engines
    • 4. Targeted phishing and social media
Module 2: Infrastructure preparation
  • 1. Command and Control (C2)
  • 2. Stealth Communication
  • 3. Setting up DNS and certificates
  • 4. Credential harvesting with Evilginx2
  • 5. Automating mass-mailing
  • 6. Securing your Red Team infrastructure
Module 3: Payload preparation
  • 1. Malicious VBA macros
  • 2. Malicious XLM macros
  • 3. Living off the Land Binaries and Scripts
  • 4. Multi-stage malware
  • 5. Persistency techniques and attacks on supply chain
  • 6. Fileless malware
  • 7. Utilizing malicious hardware tools
Moudle 4: Lessons learned and reporting
  • 1. Measuring campaign results
  • 2. Measuring campaign results
  • 3. Protecting your organization


Password:leakforum.io
hi
Reply
mmmcaca Junior Member
3
Posts
0
Threads
Junior Member
#15
(10 months ago)Sauron Wrote:
You’ll learn how attackers gather information on their targets and what information available online is useful for them.
You’ll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
You’ll also cover best practices for reporting and discover how to use what you’ve learned on this course to protect the cybersecurity infrastructure of your company or organization.

Course syllabus
This hands-on, interactive 1 Day Social Engineering & Phishing Mastery Course consists of 4 Modules packed with useful and current information directly from the field that will prepare you for any possible cyber threat.
  • Module 1: Reconnaissance
    • 1. Preparing phishing campaigns
    • 2. Open Source Intelligence (OSINT)
    • 3. Google hacking and search engines
    • 4. Targeted phishing and social media
Module 2: Infrastructure preparation
  • 1. Command and Control (C2)
  • 2. Stealth Communication
  • 3. Setting up DNS and certificates
  • 4. Credential harvesting with Evilginx2
  • 5. Automating mass-mailing
  • 6. Securing your Red Team infrastructure
Module 3: Payload preparation
  • 1. Malicious VBA macros
  • 2. Malicious XLM macros
  • 3. Living off the Land Binaries and Scripts
  • 4. Multi-stage malware
  • 5. Persistency techniques and attacks on supply chain
  • 6. Fileless malware
  • 7. Utilizing malicious hardware tools
Moudle 4: Lessons learned and reporting
  • 1. Measuring campaign results
  • 2. Measuring campaign results
  • 3. Protecting your organization


Password:leakforum.io

Thanksss
Reply
userleak Member
38
Posts
0
Threads
Member
#16
great work......
Reply
fgherh34 Junior Member
3
Posts
0
Threads
Junior Member
#17
(10 months ago)Sauron Wrote:
You’ll learn how attackers gather information on their targets and what information available online is useful for them.
You’ll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
You’ll also cover best practices for reporting and discover how to use what you’ve learned on this course to protect the cybersecurity infrastructure of your company or organization.

Course syllabus
This hands-on, interactive 1 Day Social Engineering & Phishing Mastery Course consists of 4 Modules packed with useful and current information directly from the field that will prepare you for any possible cyber threat.
  • Module 1: Reconnaissance
    • 1. Preparing phishing campaigns
    • 2. Open Source Intelligence (OSINT)
    • 3. Google hacking and search engines
    • 4. Targeted phishing and social media
Module 2: Infrastructure preparation
  • 1. Command and Control (C2)
  • 2. Stealth Communication
  • 3. Setting up DNS and certificates
  • 4. Credential harvesting with Evilginx2
  • 5. Automating mass-mailing
  • 6. Securing your Red Team infrastructure
Module 3: Payload preparation
  • 1. Malicious VBA macros
  • 2. Malicious XLM macros
  • 3. Living off the Land Binaries and Scripts
  • 4. Multi-stage malware
  • 5. Persistency techniques and attacks on supply chain
  • 6. Fileless malware
  • 7. Utilizing malicious hardware tools
Moudle 4: Lessons learned and reporting
  • 1. Measuring campaign results
  • 2. Measuring campaign results
  • 3. Protecting your organization


Password:leakforum.io

Reply
emiller45 Junior Member
11
Posts
0
Threads
Junior Member
#18
thank you.
Reply
wetbum Junior Member
5
Posts
0
Threads
Junior Member
#19
(10 months ago)Sauron Wrote:
You’ll learn how attackers gather information on their targets and what information available online is useful for them.
You’ll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
You’ll also cover best practices for reporting and discover how to use what you’ve learned on this course to protect the cybersecurity infrastructure of your company or organization.

Course syllabus
This hands-on, interactive 1 Day Social Engineering & Phishing Mastery Course consists of 4 Modules packed with useful and current information directly from the field that will prepare you for any possible cyber threat.
  • Module 1: Reconnaissance
    • 1. Preparing phishing campaigns
    • 2. Open Source Intelligence (OSINT)
    • 3. Google hacking and search engines
    • 4. Targeted phishing and social media
Module 2: Infrastructure preparation
  • 1. Command and Control (C2)
  • 2. Stealth Communication
  • 3. Setting up DNS and certificates
  • 4. Credential harvesting with Evilginx2
  • 5. Automating mass-mailing
  • 6. Securing your Red Team infrastructure
Module 3: Payload preparation
  • 1. Malicious VBA macros
  • 2. Malicious XLM macros
  • 3. Living off the Land Binaries and Scripts
  • 4. Multi-stage malware
  • 5. Persistency techniques and attacks on supply chain
  • 6. Fileless malware
  • 7. Utilizing malicious hardware tools
Moudle 4: Lessons learned and reporting
  • 1. Measuring campaign results
  • 2. Measuring campaign results
  • 3. Protecting your organization
Thank you so much man!

Password:leakforum.io

Reply
kyralk2 Banned
4
Posts
0
Threads
Banned
#20
(10 months ago)Sauron Wrote:
You’ll learn how attackers gather information on their targets and what information available online is useful for them.
You’ll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
You’ll also cover best practices for reporting and discover how to use what you’ve learned on this course to protect the cybersecurity infrastructure of your company or organization.

Course syllabus
This hands-on, interactive 1 Day Social Engineering & Phishing Mastery Course consists of 4 Modules packed with useful and current information directly from the field that will prepare you for any possible cyber threat.
  • Module 1: Reconnaissance
    • 1. Preparing phishing campaigns
    • 2. Open Source Intelligence (OSINT)
    • 3. Google hacking and search engines
    • 4. Targeted phishing and social media
Module 2: Infrastructure preparation
  • 1. Command and Control (C2)
  • 2. Stealth Communication
  • 3. Setting up DNS and certificates
  • 4. Credential harvesting with Evilginx2
  • 5. Automating mass-mailing
  • 6. Securing your Red Team infrastructure
Module 3: Payload preparation
  • 1. Malicious VBA macros
  • 2. Malicious XLM macros
  • 3. Living off the Land Binaries and Scripts
  • 4. Multi-stage malware
  • 5. Persistency techniques and attacks on supply chain
  • 6. Fileless malware
  • 7. Utilizing malicious hardware tools
Moudle 4: Lessons learned and reporting
  • 1. Measuring campaign results
  • 2. Measuring campaign results
  • 3. Protecting your organization


Password:leakforum.io

i wanna see this cool stuff
Reply


Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)