NP URI: www.nobleprog.co.ke/cc/socialengine Undefined array key 0 /apps/hitra7/npfrontend/nptemplates/default.php:137 Array ( [0] => Array ( [file] => /apps/hitra7/npfrontend/nptemplates/default.php [line] => 137 [function] => {closure:/apps/hitra7/npfrontend/index.php:5} [args] => Array ( [0] => 2 [1] => Undefined array key 0 [2] => /apps/hitra7/npfrontend/nptemplates/default.php [3] => 137 ) ) [1] => Array ( [file] => /apps/hitra7/npfrontend/modules/course/course.php [line] => 141 [args] => Array ( [0] => /apps/hitra7/npfrontend/nptemplates/default.php ) [function] => require_once ) [2] => Array ( [file] => /apps/hitra7/npfrontend/core/routes.php [line] => 16 [function] => course_menu_callback [args] => Array ( [0] => /cc/socialengine ) ) [3] => Array ( [file] => /apps/hitra7/npfrontend/__index.php [line] => 94 [args] => Array ( [0] => /apps/hitra7/npfrontend/core/routes.php ) [function] => require_once ) [4] => Array ( [file] => /apps/hitra7/npfrontend/index.php [line] => 17 [args] => Array ( [0] => /apps/hitra7/npfrontend/__index.php ) [function] => include_once ) [5] => Array ( [file] => /apps/hitra7/index.php [line] => 65 [args] => Array ( [0] => /apps/hitra7/npfrontend/index.php ) [function] => include_once ) ) NP URI: www.nobleprog.co.ke/cc/socialengine Undefined array key 1 /apps/hitra7/npfrontend/nptemplates/default.php:137 Array ( [0] => Array ( [file] => /apps/hitra7/npfrontend/nptemplates/default.php [line] => 137 [function] => {closure:/apps/hitra7/npfrontend/index.php:5} [args] => Array ( [0] => 2 [1] => Undefined array key 1 [2] => /apps/hitra7/npfrontend/nptemplates/default.php [3] => 137 ) ) [1] => Array ( [file] => /apps/hitra7/npfrontend/modules/course/course.php [line] => 141 [args] => Array ( [0] => /apps/hitra7/npfrontend/nptemplates/default.php ) [function] => require_once ) [2] => Array ( [file] => /apps/hitra7/npfrontend/core/routes.php [line] => 16 [function] => course_menu_callback [args] => Array ( [0] => /cc/socialengine ) ) [3] => Array ( [file] => /apps/hitra7/npfrontend/__index.php [line] => 94 [args] => Array ( [0] => /apps/hitra7/npfrontend/core/routes.php ) [function] => require_once ) [4] => Array ( [file] => /apps/hitra7/npfrontend/index.php [line] => 17 [args] => Array ( [0] => /apps/hitra7/npfrontend/__index.php ) [function] => include_once ) [5] => Array ( [file] => /apps/hitra7/index.php [line] => 65 [args] => Array ( [0] => /apps/hitra7/npfrontend/index.php ) [function] => include_once ) ) NP URI: www.nobleprog.co.ke/cc/socialengine Undefined array key 2 /apps/hitra7/npfrontend/nptemplates/default.php:137 Array ( [0] => Array ( [file] => /apps/hitra7/npfrontend/nptemplates/default.php [line] => 137 [function] => {closure:/apps/hitra7/npfrontend/index.php:5} [args] => Array ( [0] => 2 [1] => Undefined array key 2 [2] => /apps/hitra7/npfrontend/nptemplates/default.php [3] => 137 ) ) [1] => Array ( [file] => /apps/hitra7/npfrontend/modules/course/course.php [line] => 141 [args] => Array ( [0] => /apps/hitra7/npfrontend/nptemplates/default.php ) [function] => require_once ) [2] => Array ( [file] => /apps/hitra7/npfrontend/core/routes.php [line] => 16 [function] => course_menu_callback [args] => Array ( [0] => /cc/socialengine ) ) [3] => Array ( [file] => /apps/hitra7/npfrontend/__index.php [line] => 94 [args] => Array ( [0] => /apps/hitra7/npfrontend/core/routes.php ) [function] => require_once ) [4] => Array ( [file] => /apps/hitra7/npfrontend/index.php [line] => 17 [args] => Array ( [0] => /apps/hitra7/npfrontend/__index.php ) [function] => include_once ) [5] => Array ( [file] => /apps/hitra7/index.php [line] => 65 [args] => Array ( [0] => /apps/hitra7/npfrontend/index.php ) [function] => include_once ) )

Course Outline

Introduction

What is Social Engineering

  • Types of malware
  • The evolution of malware

Overview of Malware Attacks

  • Propagating
  • Non-propagating

Information Gathering

  • Domain information
  • Networking accounts
  • Maltego overview

Preparing the Penetration Testing Laboratory

  • Installing and configuring a virtual machine
  • Installing and configuring Maltego (information gathering tool)

Generating Evil Files

  • Installing and configuring BeeLogger
  • Implementing command lines scripts to access an operating system that uses bash
  • Creating an advanced backdoor
  • Creating a custom remote keylogger
  • Logging saved passwords
  • Executing payload
  • Reporting payload

Delivery Options

  • Initiating an SMTP server
  • Spoofing emails
  • Replicating any legitimate login page
  • Directing targets to access an evil URL

Social Engineering Prevention

  • Recognizing spoofed emails
  • Protecting against browser exploits
  • Detecting malware manually or using a sandbox

Summary and Conclusion

Requirements

  • Experience with information systems

Audience

  • Information system analysts
 14 Hours

Testimonials (2)

Related Categories