Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Hacking / Penetration Testing using Android From Scratch
Section: 1 - Introduction
1. Course Intro & Overview (2:56)
Section: 2 - Weaponizing
2. Preparing Your Android Device (2:09)
3. Installing & Configuring Nexus Root Toolkit
4. Installing Device Drivers
5. Unlocking & Rooting The Device
6. Installing NetHunter
7. NetHunter Preview and Lab Overview (5:37)
Section: 3 - Installing Kali Linux As Virtual Machine (Optional)
8. Installing Kali 2017 As a Virtual Machine (8:31)
9. Basic Overview of The Operating System (7:05)
Section: 4 - Information Gathering
10. Discovering Wireless Networks - Wardriving (7:46)
11. Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2 (7:37)
12. Network Mapping - Discovering Devices Connected To The Network (5:22)
13. Network Mapping - Discovering Open Ports (10:01)
14. Network Mapping - Discovering Installed Services (5:36)
Section: 5 - Spying
15. Introduction (3:10)
16. MITM (Man In The Middle) Methods (3:48)
Section: 6 - Spying > MITM Method 1 - Bad USB Attack
17. What Is The Bad USB Attack & How To Launch It (7:38)
18. Sniffing Data & Capturing Passwords (7:19)
19. Bypassing HTTPS (7:19)
20. DNS Spoofing (7:35)
Section: 7 - Spying > MITM Method 2 - ARP Poisoning
21. What Is ARP Poisoning (6:43)
22. ARP Poisoning & Sniffing Data Using arpspoof (7:02)
23. ARP Poisoning & Sniffing Data Using Zanti2 (2:36)
24. Intercepting Downloaded Files (7:42)
25. Replacing Images & Injecting Javascript Code (4:16)
Section: 8 - Spying > MITM Method 3 - Fake Access Point (Honey Pot)
26. Fake Access Point Theory (8:45)
27. Configuring Access Point Settings (5:59)
28. Launching The Fake Access Point (5:36)
29. Sniffing Data Sent Over The Access Point (6:11)
Section: 9 - Detection & Protection
30. Detecting ARP Poisoning Attacks (5:02)
31. Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning (4:42)
Section: 10 - Exploitation (Gaining Access)
32. Introduction (9:15)
33. Bypassing Windows/OSX Logins - Setup (4:35)
34. Bypassing Windows/OSX Logins (2:38)
35. Creating An Undetectable Backdoor (12:49)
36. Using Metasploit Meterpreter (7:03)
37. Replacing Downloads With A Backdoor (5:36)
38. Backdooring Downloads On The Fly (7:26)
39. HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB (9:07)
40. HID Keyboard Attack - Gaining Full Control Over Windows Machine (5:51)
Section: 11 - Exploitation - Rubber Ducky Scripts
43. Reverse OSX Shell To Gain Full Control Over Mac OSX Computers (6:32)
44. Reverse Linux Shell To Gain Full Control Over Linux Computers (3:40)
42. Automatic Download & Execute To Gain Full Control Over Windows (6:23)
41. What Are Rubber Ducky Scripts & How To Use Them (4:00)
Section: 12 - Detecting Malicious Files
46. Detecting Undetectable Backdoors (3:01)
45. Protecting Yourself Against Backdoor Delivery Methods (3:50)
Bonus Section
47. Bonus Lecture - What's Next?
24. Intercepting Downloaded Files
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock