Skip to content
Sale

Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih

Rated 0 out of 5
(be the first to review)

Original price was: $185.00.Current price is: $34.00.

Welcome to my comprehensive course on using Android as a penetration testing tool, you will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps and will finish up with examples of real life scenarios that will give you full control over various computer systems

Category:

Description

Purchase Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih Course at GiOlib. We actively participate in group buys and are committed to sharing knowledge with a wider audience. What's more, our courses maintain the same quality as the original sale page. You have the option to buy directly from the sale page at the full price (sale page link is provided within the post).

Learn Hacking/Penetration Testing using Android From Scratch

Learn how to use Android as an ethical hacking tool to test the security of networks and computer systems.

Welcome to my comprehensive course on using Android as a penetration testing tool, you will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps and will finish up with examples of real life scenarios that will give you full control over various computer systems.

This course focuses on the practical side penetration testing without neglecting the theory behind each attack, for each attack you will learn how that attack works and then you will learn how to practically launch that attack, this will give you full understanding of the conditions which allow this attack to be successfully executed, this knowledge will help you to detect and sometimes prevent this attack from happening. The the attacks explained in this course are launched against real devices in my lab.

The Course is Divided into four main sections:

  1. Preparing: this section will take you through the steps of of preparing your computer and installing NetHunter (an Android penetration testing platform) on your Android device. You will also learn how to use the main menus of NetHunter, and as a bonus I added three lectures to teach you how to install Kali Linux (a penetration testing OS) on your computer.
  2. Information Gathering:in this section we still don't know much about penetration testing , all we have is an Android device with NetHunter installed on it, you will learn how to start gathering information about WiFi networks around you, not only that but you will also learn how to map your current networking, displaying the connected devices and information about them such as their IP address, Mac Address, OS, open ports and running services/programs. You will also learn how to connect an external wireless card to your Android device and prepare it to be used to crack WiFi keys.
  3. Spying: In this section you will learn what is meant by MITM (Man In The Middle) and how to use your Android device to achieve it using three methods. Being the MITM will allow you to gain access to any account accessed by devices in your network, or accounts accessed by the device which your Android device is connected to via USB. You will also learn how to create a fake access point and spy on all the data sent on it.
  4. Exploitation: In this section we will have a look on a number of exploitation methods that can be used to to gain full control over your target computer weather it runs Windows/Linux/OSX only by connecting your Android device to the target computer. You will also learn why you should never leave your computer locked on a login screen as you will see login screens can be bypassed on both OSX and Windows (ie: you'll be able to login without a password to Windows and OSX machines). Finally you will learn how to make an undetectable backdoor and deliver it to the target computer by replacing files that the target machine downloads or backdooring the downloaded files on the fly.
  5. Detection & Protection: In this section you will learn three methods to detect ARP Poisoning Attacks, you will also learn how to use Wireshark to detect other suspicious activities in your network. We will also discuss how to protect against these MITM attacks and prevent them from happening. Finally you will learn how to detect backdoors that can bypass antivirus programs and check file integrity to ensure that they have not been backdoored.

Get Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih, Only Price $37

Course Curriculum

Introduction

  • Course Intro & Overview (2:56)

Weaponizing

  • Preparing Your Android Device (2:09)
  • Installing & Configuring Nexus Root Toolkit
  • Installing Device Drivers
  • Unlocking & Rooting The Devicet
  • Installing NetHunter
  • NetHunter Preview and Lab Overview (5:37)

Installing Kali Linux As Virtual Machine (Optional)

  • Installing Kali 2017 As a Virtual Machine (8:32)
  • Basic Overview of The Operating System (7:05)

Information Gathering

  • Discovering Wireless Networks – Wardriving (7:46)
  • Preparing Your Device To Crack WiFi Keys/Passwords – WEP/WPA/WPA2 (7:37)
  • Network Mapping – Discovering Devices Connected To The Network (5:22)
  • Network Mapping – Discovering Open Ports (10:01)
  • Network Mapping – Discoverig Installed Services (5:36)

Spying

  • Introduction (3:10)
  • MITM (Man In The Middle) Methods (3:48)

Spying > MITM Method 1 – Bad USB Attack

  • What Is The Bad USB Attack & How To Launch It (7:38)
  • Sniffing Data & Capturing Passwords (7:19)
  • Bypassing HTTPS (7:35)
  • DNS Spoofing (6:50)

Spying > MITM Method 2 – ARP Poisonning

  • What Is ARP Poisoning (6:43)
  • ARP Poisoning & Sniffing Data Using arpspoof (7:02)
  • ARP Poisoning & Sniffing Data Using Zanti2 (7:42)
  • Intercepting Downloaded Files (4:16)
  • Replacing Images & Injecting Javascript Code (2:36)

Spying > MITM Method 3 – Fake Access Point (Honey Pot)

  • Fake Access Point Theory (5:59)
  • Configuring Access Point Settings (5:36)
  • Launching The Fake Access Point (8:45)
  • Sniffing Data Sent Over The Access Point (6:11)

Detection & Protection

  • Detecting ARP Poisoning Attacks (5:02)
  • Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning (4:42)

Exploitation (Gaining Access)

  • Introduction (2:38)
  • Bypassing Windows/OSX Logins – Setup (5:36)
  • Bypassing Windows/OSX Logins (4:35)
  • Creating An Undetectable Backdoor (7:26)
  • Using Metasploit Meterpreter (9:15)
  • Replacing Downloadeds With A Backdoor (5:51)
  • Backdooring Downloads On The Fly (12:49)
  • HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB (7:03)rt
  • HID Keyboard Attack – Gaining Full Control Over Windows Machine (9:07)

Exploitation – Rubber Ducky Scripts

  • What Are Rubber Ducky Scripts & How To Use Them (4:00)
  • Automatic Download & Execute To Gain Full Control Over Windows (6:23)
  • Reverse OSX Shell To Gain Full Control Over Mac OSX Computers (6:32)
  • Reverse Linux Shell To Gain Full Control Over Linux Computers (3:40)

Detecting Malicious Files

  • Protecting Yourself Against Backdoor Delivery Methods (3:50)
  • Detecting Undetectable Backdoors (3:01)

Get Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih, Only Price $37


Tag: Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih  Review. Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih  download. Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih  discount.


Purchase the Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih course at the best price at GiOlib. Upon completing your purchase, you will gain access to the downloads page. where you can conveniently retrieve all associated course files. Additionally, we will send you a download notification email to your registered mail.

Unlock your full potential with our Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih courses. Our courses are meticulously designed to empower you with the skills and knowledge needed for excellence.

Why wait? Take the first step towards greatness by acquiring our Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih courses today. We ensure a smooth and secure purchasing experience that guarantees your peace of mind. Rest assured that your financial information is safeguarded through our trusted payment gateways, Stripe and PayPal.

Stripe, renowned for its robust security measures, offers a secure and dependable payment process. Your sensitive data is encrypted using state-of-the-art technology, ensuring its confidentiality throughout the transaction.

PayPal, a globally recognized payment platform, adds an extra layer of security. With its buyer protection program, you can make your purchase with confidence, knowing that your financial details are protected, allowing you to focus on your learning journey.

Is it secure? to Use of?
  • Rest assured, your identity remains completely confidential. We do not share your information with anyone, ensuring the utmost security when you buy the Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih course.
  • 100% Safe Checkout Privateness coverage
  • We employ robust communication and encryption methods to protect sensitive information. All card numbers are encrypted using AES at rest-256, and the transmission of card numbers occurs in a separate hosting environment, without sharing or storing any data.
How Will the Course Be Delivered?
  • Upon successful payment for the “Learn Hacking/Penetration Testing using Android From Scratch – Zaid Sabih course”, Most of the products will come to you immediately. But for some products were posted for offer. Please wait for our response, it might take a few hours due to the time zone difference.
  • If this occurs, kindly be patient. Our technical department will process the link shortly, and you will receive notifications directly via email. Your patience is greatly appreciated.
What Shipping Methods Are Available?
How Do I Track Order?
  • We promptly update the status of your order following your payment. If, after 7 days, there is no download link provided, the system will automatically process a refund..
  • We love to hear from you. Please don’t hesitate to email us with any comments, questions and suggestions.

Reviews

There are no reviews yet.

Leave a customer review
Cart
Back To Top