Learn Hacking/Penetration Testing using Android From Scratch
If you’ve ever wanted to learn how to break into a system or a phone and become a real hacker, this is your chance! We’ve designed a complete penetration/hacking course just for you! Hacker is often s...
- All levels
- English
Course Description
If you’ve ever wanted to learn how to break into a system or a phone and become a real hacker, this is your chance! We’ve designed a complete penetration/hacking course just for you! Hacker is often seen as someone who performs illegal intrusions into a computing system to steal money and/or information from the owner for their own gains. However, there is also some thing known as Ethical Hacking....
If you’ve ever wanted to learn how to break into a system or a phone and become a real hacker, this is your chance! We’ve designed a complete penetration/hacking course just for you! Hacker is often seen as someone who performs illegal intrusions into a computing system to steal money and/or information from the owner for their own gains. However, there is also some thing known as Ethical Hacking. This hacking, also known as penetration testing, isn’t done illegally, but rather done by companies or developers to ensure that their system’s security is sound.
What you’ll learn
- Preparing – In this section, you will learn how to prepare your system for penetration testing, including downloading and setting up NetHunter and Kali Linux
- Information Gathering – In this section, you will learn how to gather relevant information that you would require for hacking, such as WiFi networks, how to map your current networking, displaying connected devices, information about IP address, MAC address, open ports, running programs. You will also learn how to connect n external wireless card to your Android device and prepare it to be used to crack WiFi keys.
- Spying – You will learn how to become MITM (Man In The Middle) and how to use your Android device to achieve it using three methods. You will also learn how to create a fake access point and spy on all the data sent on it.
- Exploitation – In this section, you will look at different exploitation methods that can be used to to gain full control over your target computer weather it runs Windows/Linux/OSX only by connecting your Android device to the target computer. You will also learn how to bypass on OSX and Windows login screens. You will also learn how to create an undetectable backdoor and deliver it to the target computer by replacing files that the target machine downloads or backdooring the downloaded files on the fly.
- Detection & Protection – You will learn three methods to detect ARP Poisoning Attacks, how to use Wiresharks. You will also learn how to protect against these MITM attacks and prevent them from happening. Finally, you will learn how to detect backdoors that can bypass antivirus programs and check file integrity to ensure that they have not been backdoored.
Covering Topics
Section 1 : Introduction
Section 2 : Weaponizing
Section 3 : Installing Kali Linux As Virtual Machine (Optional)
Section 4 : Information Gathering
Section 5 : Spying
Section 6 : Spying > MITM Method 1 - Bad USB Attack
Section 7 : Spying > MITM Method 2 - ARP Poisonning
Section 8 : Spying > MITM Method 3 - Fake Access Point (Honey Pot)
Section 9 : Detection & Protection
Section 10 : Exploitation (Gaining Access)
Section 11 : Exploitation - Rubber Ducky Scripts
Section 12 : Detecting Malicious Files
Curriculum
Frequently Asked Questions
This course includes
- Lectures 42
- Duration 4 Hour
- Language English
- Certificate No