Curriculum
12 Sections
45 Lessons
52 Weeks
Expand all sections
Collapse all sections
Weaponizing
5
1.1
Preparing your Android Device
2 Minutes
1.2
Installing & Configuring Nexus Root Toolkit
5 Minutes
1.3
Installing Device Drivers
7 Minutes
1.4
Installing NetHunter
10 Minutes
1.5
Net Hunter Preview and Lab Overview
5 Minutes
Installing Kali Linux As Virtual Machine (Optional)
2
2.1
Installing Kali 2017 As a Virtual Machine
7 Minutes
2.2
Basic Overview of The Operating System
8 Minutes
4 Information Gathering
5
3.1
Discovering Wireless Networks – Wardriving
7 Minutes
3.2
Preparing Your Device To Crack WiFi Keys/Passwords – WEP/WPA/WPA2
5 Minutes
3.3
Network Mapping – Discovering Devices Connected To The Network
7 Minutes
3.4
Network Mapping – Discovering Open Ports
10 Minutes
3.5
Network Mapping – Discovering Installed Services
5 Minutes
5 Spying
2
4.1
Introduction
3 Minutes
4.2
MITM (Man in the Middle) Methods
3 Minutes
6 Spying > MITM Method 1 - Bad USB Attack
4
5.1
What Is The Bad USB Attack & How To Launch It
7 Minutes
5.2
Sniffing Data & Capturing Passwords
7 Minutes
5.3
Bypassing HTTPS
7 Minutes
5.4
DNS Spoofing
6 Minutes
7 Spying > MITM Method 2 - ARP Positioning
5
6.1
What Is ARP Poisoning?
6 Minutes
6.2
ARP Poisoning & Sniffing Data Using arpspoof
7 Minutes
6.3
ARP Poisoning & Sniffing Data Using Zanti2
7 Minutes
6.4
Intercepting Downloaded Files
2 Minutes
6.5
Replacing Images & Injecting Javascript Code
4 Minutes
8 Spying > MITM Method 3 - Fake Access Point (Honey Pot)
4
7.1
Fake Access Point Theory
5 Minutes
7.2
Configuring Access Point Settings
5 Minutes
7.3
Launching the fake access point
8 Minutes
7.4
Sniffing Data Sent Over the Access point
6 Minutes
9 Detection and Protection
2
8.1
Detecting ARP Poisoning Attacks
5 Minutes
8.2
Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning
4 Minutes
10 Exploitation (Gaining Access)
9
9.1
Introduction
2 Minutes
9.2
Bypassing Windows/ OSX Logins – Setup
5 Minutes
9.3
Bypassing Windows/ OSX Logins
4 Minutes
9.4
Creating An undetectable Backdoor
7 Minutes
9.5
Using Metaspoilt MeterPreter
9 Minutes
9.6
Replacing Downloads with a Backdoor
9 Minutes
9.7
Backdooring Downloads on the Fly
7 Minutes
9.8
HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB
5 Minutes
9.9
HID Keyboard Attack – Gaining Full Control Over Windows Machine
12 Minutes
11 Exploitation Rubber Ducky Scripts
4
10.1
What are Rubber Ducky Scripts and How to Use Them
4 Minutes
10.2
Automatic Download and Execute To Gain Full Control Over Windows
6 Minutes
10.3
Reverse Osx Shell To Gain Control Over Mac Osx Computers
6 Minutes
10.4
Reverse Linux Shell To Gain Full Control Over Linux Computers
12 Minutes
12 Detecting Malicious Files
2
11.1
Protecting Yourself Against Backdoor Delivery Methods
3 Minutes
11.2
Detecting undectable Backdoors
3 Minutes
13 Bonus Selection
1
12.1
Bonus Lecture What’s Next ?
5 Minutes
Learn Hacking Penetration Testing Using Android From Scratch
Search
Installing & Configuring Nexus Root Toolkit
https://dwnk32xmy75f1.cloudfront.net/wp-content/uploads/20180926044953/UmB5RfV3.mp4
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content