Curriculum
12 Sections
45 Lessons
52 Weeks
Expand all sections
Collapse all sections
Weaponizing
5
1.1
Preparing your Android Device
2 Minutes
1.2
Installing & Configuring Nexus Root Toolkit
5 Minutes
1.3
Installing Device Drivers
7 Minutes
1.4
Installing NetHunter
10 Minutes
1.5
Net Hunter Preview and Lab Overview
5 Minutes
Installing Kali Linux As Virtual Machine (Optional)
2
2.1
Installing Kali 2017 As a Virtual Machine
7 Minutes
2.2
Basic Overview of The Operating System
8 Minutes
4 Information Gathering
5
3.1
Discovering Wireless Networks – Wardriving
7 Minutes
3.2
Preparing Your Device To Crack WiFi Keys/Passwords – WEP/WPA/WPA2
5 Minutes
3.3
Network Mapping – Discovering Devices Connected To The Network
7 Minutes
3.4
Network Mapping – Discovering Open Ports
10 Minutes
3.5
Network Mapping – Discovering Installed Services
5 Minutes
5 Spying
2
4.1
Introduction
3 Minutes
4.2
MITM (Man in the Middle) Methods
3 Minutes
6 Spying > MITM Method 1 - Bad USB Attack
4
5.1
What Is The Bad USB Attack & How To Launch It
7 Minutes
5.2
Sniffing Data & Capturing Passwords
7 Minutes
5.3
Bypassing HTTPS
7 Minutes
5.4
DNS Spoofing
6 Minutes
7 Spying > MITM Method 2 - ARP Positioning
5
6.1
What Is ARP Poisoning?
6 Minutes
6.2
ARP Poisoning & Sniffing Data Using arpspoof
7 Minutes
6.3
ARP Poisoning & Sniffing Data Using Zanti2
7 Minutes
6.4
Intercepting Downloaded Files
2 Minutes
6.5
Replacing Images & Injecting Javascript Code
4 Minutes
8 Spying > MITM Method 3 - Fake Access Point (Honey Pot)
4
7.1
Fake Access Point Theory
5 Minutes
7.2
Configuring Access Point Settings
5 Minutes
7.3
Launching the fake access point
8 Minutes
7.4
Sniffing Data Sent Over the Access point
6 Minutes
9 Detection and Protection
2
8.1
Detecting ARP Poisoning Attacks
5 Minutes
8.2
Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning
4 Minutes
10 Exploitation (Gaining Access)
9
9.1
Introduction
2 Minutes
9.2
Bypassing Windows/ OSX Logins – Setup
5 Minutes
9.3
Bypassing Windows/ OSX Logins
4 Minutes
9.4
Creating An undetectable Backdoor
7 Minutes
9.5
Using Metaspoilt MeterPreter
9 Minutes
9.6
Replacing Downloads with a Backdoor
9 Minutes
9.7
Backdooring Downloads on the Fly
7 Minutes
9.8
HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB
5 Minutes
9.9
HID Keyboard Attack – Gaining Full Control Over Windows Machine
12 Minutes
11 Exploitation Rubber Ducky Scripts
4
10.1
What are Rubber Ducky Scripts and How to Use Them
4 Minutes
10.2
Automatic Download and Execute To Gain Full Control Over Windows
6 Minutes
10.3
Reverse Osx Shell To Gain Control Over Mac Osx Computers
6 Minutes
10.4
Reverse Linux Shell To Gain Full Control Over Linux Computers
12 Minutes
12 Detecting Malicious Files
2
11.1
Protecting Yourself Against Backdoor Delivery Methods
3 Minutes
11.2
Detecting undectable Backdoors
3 Minutes
13 Bonus Selection
1
12.1
Bonus Lecture What’s Next ?
5 Minutes
Learn Hacking Penetration Testing Using Android From Scratch
Search
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content