Sorry, your browser is not supported
To have the best experience using Skillshare, we recommend that you use one of these supported browsers.
Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
73 Videos (4h 4m)
    • Ethical password hacking and protecting

      0:27
    • Disclaimer

      0:40
    • How to take this course

      1:29
    • Keylogger

      0:41
    • Process

      3:07
    • Software for keylogger

      1:39
    • Whatsapp hacking

      2:36
    • Whatsapp hacking hands on

      9:28
    • Whatsapp hacking hands on result

      1:21
    • Whatsapp hacking hands on - cancel subscription

      1:49
    • Rooting android device to install mspy app

      3:58
    • Counter measures for keylogger

      1:09
    • Finding keylogger in android

      2:44
    • Finding keylogger in mac OS

      1:55
    • 2)Guessing -Introduction

      0:28
    • Guessing password

      2:07
    • Software for brute force

      1:53
    • Introduction to Kali Linux

      6:39
    • Brute force with help of guessing

      1:27
    • Counter measures for guessing

      0:59
    • 3)BruteForce - Introduction

      0:32
    • what you need for brute force

      1:53
    • Why not to use virtual box

      1:54
    • Wifi password hacking through brute force

      2:28
    • Wifi password hacking through brute force in depth with explanation

      6:18
    • Hacking through brute force and guessing

      1:27
    • Setting up kali linux in virtual box

      8:41
    • Setting up DVWA-1

      3:45
    • Setting up DVWA 2

      5:33
    • Introduction to Hydra

      2:53
    • Hydra collecting information

      15:10
    • Using hydra to brute force

      4:49
    • List of password

      2:20
    • Brute force WiFi using smart phone

      2:39
    • L0pht crack download and install

      3:52
    • L0pht crack wizard

      10:16
    • Counter measures for brute force

      2:23
    • 4)Phishing - Introduction

      0:29
    • What you need for phishing

      1:53
    • Password hacking through phishing

      3:50
    • Things to keep in mind while cloning login page

      2:18
    • Login page of any website can be cloned

      1:24
    • Using domain name for phishing 1/2

      2:56
    • Using domain name for phishing 2/2

      1:14
    • Developing facebook phishing page(optional but recommended way)

      3:05
    • Hosting Facebook phishing page

      2:54
    • Phishing page in depth with explanation

      2:34
    • Attaching phishing page to domain

      2:41
    • Using Google AdWords for phishing -1/10- Plan

      1:34
    • Using Google AdWords for phishing -2/10 - Setting up AdWord account

      2:47
    • Using Google AdWords for phishing -3/10- AdWord account in brief

      2:12
    • Using Google AdWords for phishing -4/10- Keyword

      1:25
    • Using Google AdWords for phishing -5/10- Keyword match

      2:16
    • Using Google AdWords for phishing -6/10- Keyword planner

      2:29
    • Using Google AdWords for phishing -7/10- Creating campaign

      4:08
    • Using Google AdWords for phishing -8/10- Results

      1:41
    • Using Google AdWords for phishing-9/10 -Budget

      2:56
    • Using Google AdWords for phishing -10/10- Summary

      3:49
    • Phishing through email in depth- custom email

      6:44
    • Counter measures for phishing

      0:37
    • 5)SocialEngineering - Introduction

      1:20
    • Social engineering through human method

      5:56
    • Social engineering through computer method

      4:56
    • Counter measures for social engineering engineering

      1:39
    • SQL Injection

      9:32
    • Hack Windows 7 with Metasploit using Kali Linux

      6:42
    • Accessing file inside password protected windows system

      1:45
    • crack into password protected windows 7 system

      3:44
    • Crack User Password in a Linux System

      3:44
    • Hacking password through browser

      1:49
    • Pass Phrase

      11:46
    • How to create stronger passwords

      5:02
    • Facts on password hacking

      4:50