Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Hacking/Penetration Testing using Android From Scratch
Introduction
Course Intro & Overview (2:56)
Weaponizing
Preparing Your Android Device (2:09)
Installing & Configuring Nexus Root Toolkit
Installing Device Drivers
Unlocking & Rooting The Device
Installing NetHunter
NetHunter Preview and Lab Overview (5:37)
Installing Kali Linux As Virtual Machine (Optional)
Installing Kali 2017 As a Virtual Machine (8:32)
Basic Overview of The Operating System (7:05)
Information Gathering
Discovering Wireless Networks - Wardriving (7:46)
Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2 (7:37)
Network Mapping - Discovering Devices Connected To The Network (5:22)
Network Mapping - Discovering Open Ports (10:01)
Network Mapping - Discoverig Installed Services (5:36)
Spying
Introduction (3:10)
MITM (Man In The Middle) Methods (3:48)
Spying > MITM Method 1 - Bad USB Attack
What Is The Bad USB Attack & How To Launch It (7:38)
Sniffing Data & Capturing Passwords (7:19)
Bypassing HTTPS (7:35)
DNS Spoofing (6:50)
Spying > MITM Method 2 - ARP Poisonning
What Is ARP Poisoning (6:43)
ARP Poisoning & Sniffing Data Using arpspoof (7:02)
ARP Poisoning & Sniffing Data Using Zanti2 (7:42)
Intercepting Downloaded Files (4:16)
Replacing Images & Injecting Javascript Code (2:36)
Spying > MITM Method 3 - Fake Access Point (Honey Pot)
Fake Access Point Theory (5:59)
Configuring Access Point Settings (5:36)
Launching The Fake Access Point (8:45)
Sniffing Data Sent Over The Access Point (6:11)
Detection & Protection
Detecting ARP Poisoning Attacks (5:02)
Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning (4:42)
Exploitation (Gaining Access)
Introduction (2:38)
Bypassing Windows/OSX Logins - Setup (5:36)
Bypassing Windows/OSX Logins (4:35)
Creating An Undetectable Backdoor (7:26)
Using Metasploit Meterpreter (9:15)
Replacing Downloadeds With A Backdoor (5:51)
Backdooring Downloads On The Fly (12:49)
HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB (7:03)
HID Keyboard Attack - Gaining Full Control Over Windows Machine (9:07)
Exploitation - Rubber Ducky Scripts
What Are Rubber Ducky Scripts & How To Use Them (4:00)
Automatic Download & Execute To Gain Full Control Over Windows (6:23)
Reverse OSX Shell To Gain Full Control Over Mac OSX Computers (6:32)
Reverse Linux Shell To Gain Full Control Over Linux Computers (3:40)
Detecting Malicious Files
Protecting Yourself Against Backdoor Delivery Methods (3:50)
Detecting Undetectable Backdoors (3:01)
Detecting Undetectable Backdoors
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock