Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Hacking/Penetration Testing Using Android From Scratch
Introduction
Course Intro & Overview (2:56)
Weaponising
Preparing Your Android Device (2:09)
Installing Device Drivers
Unlocking & Rooting The Device
Installing NetHunter
NetHunter Preview & Lab Overview (5:37)
Installing Kali Linux As Virtual Machine (Optional)
Basic Overview Of The Operating System (7:06)
Installing Kali 2020 As a Virtual Machine (10:34)
Information Gathering
Discovering Wireless Networks - Wardriving (7:46)
Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2 (7:37)
Network Mapping - Discovering Devices Connected To The Network (5:22)
Network Mapping - Discovering Open Ports (10:01)
Network Mapping - Discovering Installed Services (5:36)
Spying
Introduction (3:10)
MITM (Man In The Middle) Methods (3:48)
Spying > MITM Method 1 - Bad USB Attack
What Is The Bad USB Attack & How To Launch It (7:39)
Sniffing Data & Capturing Passwords (7:19)
Bypassing HTTPS (7:35)
DNS Spoofing (6:51)
Spying > MITM Method 2 - ARP Poisonning
What Is ARP Poisonning (6:43)
ARP Poisoning & Sniffing Data Using arpspoof (7:02)
ARP Poisoning & Sniffing Data Using Zanti2 (7:42)
Intercepting Downloaded Files (4:16)
Replacing Images & Injecting Javascript Code (2:36)
Spying > MITM Method 3 - Fake Access Point (Honey Pot)
Fake Access Point Theory (5:59)
Configuring Access Point Settings (5:36)
Launching The Fake Access Point (8:46)
Sniffing Data Sent Over The Accesspoint (6:12)
Detection & Protection
Detecting ARP Poisoning Attacks (5:02)
Detecting Suspicious Activity in the Network & Solutions to ARP (4:42)
Exploitation (Gaining Access)
Introduction (2:38)
Bypassing Windows/OSX Logins - Setup (5:36)
Bypassing Windows/OSX Logins (4:35)
Creating An Undetectable Backdoor (7:26)
Using Metasploit Meterpreter (9:15)
Replace Downloads With A Backdoor (5:51)
Backdooring Downloads On The Fly (12:49)
HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB (7:03)
HID Keyboard Attack - Gaining Full Control Over Windows Machine (9:07)
Exploitation - Rubber Ducky Scripts
What Are Rubber Ducky Scripts & How To Use Them (4:01)
Automatic Download & Execute To Gain Full Control Over Windows (6:23)
Reverse OSX Shell To Gain Full Control Over Mac OSX Computers (6:32)
Reverse Linux Shell To Gain Full Control Over Linux Computers (3:40)
Detecting Malicious Files
Protecting Yourself Against Backdoor Delivery Methods (3:50)
Detecting Undetectable Backdoors (3:01)
Reverse Linux Shell To Gain Full Control Over Linux Computers
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock