Home | About Us | Contact Us
Quick Member Login:
Forgot password?
Forum Sponsors:
Forum Statistics:
Forum Members: 318,190
Total Threads: 100,490
Total Posts: 234,461


There are 260 users
currently browsing forums.
Forum Sponsors:
Forum Sponsors:
You don't appear to be registered. Click here to register
Search the forums:

Gsm Kashmir » Basic Learning and Tutorials » Basic Learning and Tutorials » Learn HackingPenetration Testing using Android From Scratch

We are currently looking for some great moderators to help us out with keeping the forum running and becoming an even bigger part of our community!
Reply
 
Thread Tools Display Modes
Old 09-05-2016, 09:30 PM   #1
Goldenminer
App Manager
 
Join Date: Jun 2015
Age: 39
Posts: 692
Goldenminer is on a distinguished road
Default Learn HackingPenetration Testing using Android From Scratch



Learn HackingPenetration Testing using Android From Scratch
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4.5 Hours | Lec: 47 | 1.73 GB
Genre: eLearning | Language: English
45+ Videos to learn how to use Android as an ethical hacking tool to test the security of networks and computer systems.
Welcome to my comprehensive course on using Android as a penetration testing tool, you will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps and will finish up with examples of real life scenarios that will give you full control over various computer systems.

This course focuses on the practical side penetration testing without neglecting the theory behind each attack, for each attack you will learn how that attack works and then you will learn how to practically launch that attack, this will give you full understanding of the conditions which allow this attack to be successfully executed, this knowledge will help you to detect and sometimes prevent this attack from happening. The the attacks explained in this course are launched against real devices in my lab.

The Course is Divided into four main sections:

Preparing: this section will take you through the steps of of preparing your computer and installing NetHunter (an Android penetration testing platform) on your Android device. You will also learn how to use the main menus of NetHunter, and as a bonus I added three lectures to teach you how to install Kali Linux (a penetration testing OS) on your computer.
Information Gathering:in this section we still don't know much about penetration testing , all we have is an Android device with NetHunter installed on it, you will learn how to start gathering information about WiFi networks around you, not only that but you will also learn how to map your current networking, displaying the connected devices and information about them such as their IP address, Mac Address, OS, open ports and running services/programs. You will also learn how to connect an external wireless card to your Android device and prepare it to be used to crack WiFi keys.
Spying: In this section you will learn what is meant by MITM (Man In The Middle) and how to use your Android device to achieve it using three methods. Being the MITM will allow you to gain access to any account accessed by devices in your network, or accounts accessed by the device which your Android device is connected to via USB. You will also learn how to create a fake access point and spy on all the data sent on it.
Exploitation: In this section we will have a look on a number of exploitation methods that can be used to to gain full control over your target computer weather it runs Windows/Linux/OSX only by connecting your Android device to the target computer. You will also learn why you should never leave your computer locked on a login screen as you will see login screens can be bypassed on both OSX and Windows (ie: you'll be able to login without a password to Windows and OSX machines). Finally you will learn how to make an undetectable backdoor and deliver it to the target computer by replacing files that the target machine s or backdooring the ed files on the fly.
Detection & Protection: In this section you will learn three methods to detect ARP Poisoning Attacks, you will also learn how to use Wireshark to detect other suspicious activities in your network. We will also discuss how to protect against these MITM attacks and prevent them from happening. Finally you will learn how to detect backdoors that can bypass antivirus programs and check file integrity to ensure that they have not been backdoored.
NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.



Download link:

nitroflare_com:
Code:
http://nitroflare.com/view/F8474F38AECCFD8/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part1.rar
http://nitroflare.com/view/CDADFC89798458E/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part2.rar
http://nitroflare.com/view/531F39FFD4C0F12/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part3.rar
http://nitroflare.com/view/6FC84EA5CC2048D/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part4.rar
http://nitroflare.com/view/B0AA18CDF206A52/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part5.rar
http://nitroflare.com/view/B9DB9DA801111CC/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part6.rar
http://nitroflare.com/view/672049593806767/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part7.rar
uploaded_net:
Code:
http://uploaded.net/file/n0ez6uej/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part1.rar
http://uploaded.net/file/diqttbns/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part2.rar
http://uploaded.net/file/bst38pr7/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part3.rar
http://uploaded.net/file/cy163q1c/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part4.rar
http://uploaded.net/file/8fyp8fmu/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part5.rar
http://uploaded.net/file/xjq4bhwd/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part6.rar
http://uploaded.net/file/kcud7mho/bwgcr.Learn.HackingPenetration.Testing.using.Android.From.Scratch.part7.rar
Goldenminer is offline   Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Free counters!
All times are GMT +6. The time now is 08:36 AM.
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2023, vBulletin Solutions Inc.
Design By: MIR XAHOOR