Learn Hacking Using Android From Scratch [Video]

Preview in Mapt

Learn Hacking Using Android From Scratch [Video]

Zaid Sabih
New Release!

Learn how to use Android as an ethical hacking tool
Mapt Subscription
FREE
โ‚ฌ29.98/m after trial
Video
โ‚ฌ82.62
RRP โ‚ฌ97.18
Save 14%
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packtโ€™s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
โ‚ฌ0.00
โ‚ฌ82.62
โ‚ฌ29.99 p/m after trial
RRP โ‚ฌ97.18
Subscription
Video
Start 14 Day Trial

Frequently bought together


Learn Hacking Using Android From Scratch [Video] Book Cover
Learn Hacking Using Android From Scratch [Video]
โ‚ฌ 97.18
โ‚ฌ 82.62
Learn Website Hacking / Penetration Testing From Scratch [Video] Book Cover
Learn Website Hacking / Penetration Testing From Scratch [Video]
โ‚ฌ 183.58
โ‚ฌ 156.06
Buy 2 for โ‚ฌ35.72
Save โ‚ฌ204.20
Add to Cart

Video Details

ISBN 139781789341447
Course Length4 hours and 15 minutes

Video Description

Welcome to this comprehensive course on using Android as a penetration testing tool. You will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps, and will finish up with examples of real-life scenarios that will give you full control over various computer systems. This course focuses on the practical side of penetration testing without neglecting the theory behind each attack. For each attack you will learn how that attack works and then you will learn how to practically launch that attack. This will give you a full understanding of the conditions which allow this attack to be successfully executed, and will help you to detect (and sometimes prevent) this attack from happening. The attacks explained in this course are launched against real devices.

Style and Approach

Hands-on course on using Android as a penetration testing tool, you will start as a beginner with no previous knowledge about penetration testing.

Table of Contents

Introduction
Course Intro & Overview
Weaponizing
Preparing Your Android Device
NetHunter Preview and Lab Overview
Installing Kali Linux As Virtual Machine (Optional)
Installing Kali 2017 As a Virtual Machine
Basic Overview of the Operating System
Information Gathering
Discovering Wireless Networks โ€“ Wardriving
Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2
Network Mapping - Discovering Devices Connected To the Network
Network Mapping - Discovering Open Ports
Network Mapping - Discovering Installed Services
Spying
Introduction
MITM (Man In The Middle) Methods
Spying > MITM Method 1 - Bad USB Attack
What Is the Bad USB Attack & How to Launch It
Sniffing Data & Capturing Passwords
Bypassing HTTPS
DNS Spoofing
Spying > MITM Method 2 - ARP Poisoning
What Is ARP Poisoning
ARP Poisoning & Sniffing Data Using arpspoof
ARP Poisoning & Sniffing Data Using Zanti2
Intercepting Downloaded Files
Replacing Images & Injecting Javascript Code
Spying > MITM Method 3 - Fake Access Point (Honey Pot)
Fake Access Point Theory
Configuring Access Point Settings
Launching the Fake Access Point
Sniffing Data Sent Over the Access Point
Detection & Protection
Detecting ARP Poisoning Attacks
Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning
Exploitation (Gaining Access)
Introduction
Bypassing Windows/OSX Logins โ€“ Setup
Bypassing Windows/OSX Logins
Creating an Undetectable Backdoor
Using Metasploit Meterpreter
Replacing Downloads With a Backdoor
Backdooring Downloads On the Fly
HID Keyboard Attack- Executing Windows Commands on Target Computer via USB
HID Keyboard Attack - Gaining Full Control over Windows Machine
Exploitation - Rubber Ducky Scripts
What Are Rubber Ducky Scripts & How to Use Them
Automatic Download & Execute To Gain Full Control Over Windows
Reverse OSX Shell to Gain Full Control over Mac OSX Computers
Reverse Linux Shell to Gain Full Control over Linux Computers
Detecting Malicious Files
Protecting Yourself against Backdoor Delivery Methods
Detecting Undetectable Backdoors

What You Will Learn

  • This course includes 45 Lectures that teach you how to use your Android device to hack into other computers and networks to test their security.
  • Root and unlock your Android device (For Nexus devices only); 
  • Learn how to install NetHunter on your Android Device (For Nexus devices only)
  • Install other apps needed for penetration testing; install Kali Linux as a virtual machine inside Windows or OSX
  • Discover all the wifi networks around you and gather information about them
  • Prepare your Android device to be used to crack Wi-Fi passwords (WEP/WPA/WPA2); discover devices in the same network and their OS, open ports, running services, and so on
  • Create a fake access point with an internet connection and spy on clients; spy on computers wirelessly (ARP Spoofing) or by connecting to them using the USB cable (BadUSB Attack)
  • Carry out a number of man-in-the-middle attacks; analyse packet files using Wireshark; bypass OSX/Windows login, and much more.

Authors

Table of Contents

Introduction
Course Intro & Overview
Weaponizing
Preparing Your Android Device
NetHunter Preview and Lab Overview
Installing Kali Linux As Virtual Machine (Optional)
Installing Kali 2017 As a Virtual Machine
Basic Overview of the Operating System
Information Gathering
Discovering Wireless Networks โ€“ Wardriving
Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2
Network Mapping - Discovering Devices Connected To the Network
Network Mapping - Discovering Open Ports
Network Mapping - Discovering Installed Services
Spying
Introduction
MITM (Man In The Middle) Methods
Spying > MITM Method 1 - Bad USB Attack
What Is the Bad USB Attack & How to Launch It
Sniffing Data & Capturing Passwords
Bypassing HTTPS
DNS Spoofing
Spying > MITM Method 2 - ARP Poisoning
What Is ARP Poisoning
ARP Poisoning & Sniffing Data Using arpspoof
ARP Poisoning & Sniffing Data Using Zanti2
Intercepting Downloaded Files
Replacing Images & Injecting Javascript Code
Spying > MITM Method 3 - Fake Access Point (Honey Pot)
Fake Access Point Theory
Configuring Access Point Settings
Launching the Fake Access Point
Sniffing Data Sent Over the Access Point
Detection & Protection
Detecting ARP Poisoning Attacks
Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning
Exploitation (Gaining Access)
Introduction
Bypassing Windows/OSX Logins โ€“ Setup
Bypassing Windows/OSX Logins
Creating an Undetectable Backdoor
Using Metasploit Meterpreter
Replacing Downloads With a Backdoor
Backdooring Downloads On the Fly
HID Keyboard Attack- Executing Windows Commands on Target Computer via USB
HID Keyboard Attack - Gaining Full Control over Windows Machine
Exploitation - Rubber Ducky Scripts
What Are Rubber Ducky Scripts & How to Use Them
Automatic Download & Execute To Gain Full Control Over Windows
Reverse OSX Shell to Gain Full Control over Mac OSX Computers
Reverse Linux Shell to Gain Full Control over Linux Computers
Detecting Malicious Files
Protecting Yourself against Backdoor Delivery Methods
Detecting Undetectable Backdoors

Video Details

ISBN 139781789341447
Course Length4 hours and 15 minutes
Read More

Read More Reviews

Recommended for You

Learn Website Hacking / Penetration Testing From Scratch [Video] Book Cover
Learn Website Hacking / Penetration Testing From Scratch [Video]
โ‚ฌ 183.58
โ‚ฌ 156.06
Learn Network Hacking From Scratch (WiFi and Wired) [Video] Book Cover
Learn Network Hacking From Scratch (WiFi and Wired) [Video]
โ‚ฌ 97.18
โ‚ฌ 82.62
Learn Ethical Hacking From Scratch [Video] Book Cover
Learn Ethical Hacking From Scratch [Video]
โ‚ฌ 188.38
โ‚ฌ 160.14
Build Real World Websites from Scratch using HTML5 and CSS3 [Video] Book Cover
Build Real World Websites from Scratch using HTML5 and CSS3 [Video]
โ‚ฌ 183.58
โ‚ฌ 156.06
Learn Social Engineering From Scratch [Video] Book Cover
Learn Social Engineering From Scratch [Video]
โ‚ฌ 183.58
โ‚ฌ 156.06
Unity 2017 - Building a Tilemap 2D Game from Scratch [Video] Book Cover
Unity 2017 - Building a Tilemap 2D Game from Scratch [Video]
โ‚ฌ 122.38
โ‚ฌ 104.04