Oreilly - Learn Hacking Using Android From Scratch - 9781789341447
Oreilly - Learn Hacking Using Android From Scratch
by Zaid Sabih | Publisher: Packt Publishing | Release Date: April 2018 | ISBN: 9781789341447


Learn how to use Android as an ethical hacking toolAbout This VideoPrepare your computer by installing NetHunter (an Android penetration testing platform) on your Android device.Learn how to use the main menus of NetHunter, and how to install Kali Linux (a penetration testing OS) on your computer, and much more.In DetailWelcome to this comprehensive course on using Android as a penetration testing tool. You will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps, and will finish up with examples of real-life scenarios that will give you full control over various computer systems. This course focuses on the practical side of penetration testing without neglecting the theory behind each attack. For each attack you will learn how that attack works and then you will learn how to practically launch that attack. This will give you a full understanding of the conditions which allow this attack to be successfully executed, and will help you to detect (and sometimes prevent) this attack from happening. The attacks explained in this course are launched against real devices.
  1. Chapter 1 : Introduction
    • Course Intro & Overview 00:02:57
  2. Chapter 2 : Weaponizing
    • Preparing Your Android Device 00:02:09
    • NetHunter Preview and Lab Overview 00:05:37
  3. Chapter 3 : Installing Kali Linux As Virtual Machine (Optional)
    • Installing Kali 2017 As a Virtual Machine 00:08:31
    • Basic Overview of the Operating System 00:07:06
  4. Chapter 4 : Information Gathering
    • Discovering Wireless Networks – Wardriving 00:07:46
    • Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2 00:07:38
    • Network Mapping - Discovering Devices Connected To the Network 00:05:23
    • Network Mapping - Discovering Open Ports 00:10:02
    • Network Mapping - Discovering Installed Services 00:05:36
  5. Chapter 5 : Spying
    • Introduction 00:03:10
    • MITM (Man In The Middle) Methods 00:03:48
  6. Chapter 6 : Spying > MITM Method 1 - Bad USB Attack
    • What Is the Bad USB Attack & How to Launch It 00:07:39
    • Sniffing Data & Capturing Passwords 00:07:20
    • Bypassing HTTPS 00:07:35
    • DNS Spoofing 00:06:51
  7. Chapter 7 : Spying > MITM Method 2 - ARP Poisoning
    • What Is ARP Poisoning 00:06:44
    • ARP Poisoning & Sniffing Data Using arpspoof 00:07:02
    • ARP Poisoning & Sniffing Data Using Zanti2 00:07:42
    • Intercepting Downloaded Files 00:04:17
    • Replacing Images & Injecting Javascript Code 00:02:37
  8. Chapter 8 : Spying > MITM Method 3 - Fake Access Point (Honey
    • Fake Access Point Theory 00:05:59
    • Configuring Access Point Settings 00:05:37
    • Launching the Fake Access Point 00:08:46
    • Sniffing Data Sent Over the Access Point 00:06:12
  9. Chapter 9 : Detection & Protection
    • Detecting ARP Poisoning Attacks 00:05:02
    • Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning 00:04:43
  10. Chapter 10 : Exploitation (Gaining Access)
    • Introduction 00:02:39
    • Bypassing Windows/OSX Logins – Setup 00:05:36
    • Bypassing Windows/OSX Logins 00:04:35
    • Creating an Undetectable Backdoor 00:07:26
    • Using Metasploit Meterpreter 00:09:16
    • Replacing Downloads With a Backdoor 00:05:52
    • Backdooring Downloads On the Fly 00:12:49
    • HID Keyboard Attack- Executing Windows Commands on Target Computer via USB 00:07:04
    • HID Keyboard Attack - Gaining Full Control over Windows Machine 00:09:08
  11. Chapter 11 : Exploitation - Rubber Ducky Scripts
    • What Are Rubber Ducky Scripts & How to Use Them 00:04:01
    • Automatic Download & Execute To Gain Full Control Over Windows 00:06:23
    • Reverse OSX Shell to Gain Full Control over Mac OSX Computers 00:06:32
    • Reverse Linux Shell to Gain Full Control over Linux Computers 00:03:41
  12. Chapter 12 : Detecting Malicious Files
    • Protecting Yourself against Backdoor Delivery Methods 00:03:51
    • Detecting Undetectable Backdoors 00:03:01
  13. Oreilly - Learn Hacking Using Android From Scratch


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss