Learn Hacking/Penetration Testing using Android From Scratch

Avatar
(0 review)
$100.00 $25.00

Notes:

  • All the videos in this course are downloadable.

Welcome to my comprehensive course on using Android as a penetration testing tool, you will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps and will finish up with examples of real life scenarios that will give you full control over various computer systems.

This course focuses on the practical side penetration testing without neglecting the theory behind each attack, for each attack you will learn how that attack works and then you will learn how to practically launch that attack, this will give you full understanding of the conditions which allow this attack to be successfully executed, this knowledge will help you to detect and sometimes prevent this attack from happening. The the attacks explained in this course are launched against real devices in my lab.

The Course is Divided into four main sections:

  1. Preparing: this section will take you through the steps of of preparing your computer and installing NetHunter (an Android penetration testing platform) on your Android device. You will also learn how to use the main menus of NetHunter, and as a bonus I added three lectures to teach you how to install Kali Linux (a penetration testing OS) on your computer.
  2. Information Gathering:in this section we still don’t know much about penetration testing , all we have is an Android device with NetHunter installed on it, you will learn how to start gathering information about WiFi networks around you, not only that but you will also learn how to map your current networking, displaying the connected devices and information about them such as their IP address, Mac Address, OS, open ports and running services/programs. You will also learn how to connect an external wireless card to your Android device and prepare it to be used to crack WiFi keys.
  3. Spying: In this section you will learn  what is meant by MITM (Man In The Middle) and how to use your Android device to achieve it using three methods. Being the MITM will allow you to gain access to any account accessed by devices in your network, or accounts accessed by the device which your Android device is connected to via USB. You will also learn how to create a fake access point and spy on all the data sent on it. 
  4. Exploitation: In this section we will have a look on a number of exploitation methods that can be used to to gain full control over your target computer weather it runs Windows/Linux/OSX only by connecting your Android device to the target computerYou will also learn why you should never leave your computer locked on a login screen as you will see login screens can be bypassed on both OSX and Windows (ie: you’ll be able to login without a password to Windows and OSX machines). Finally you will learn how to make an undetectable backdoor and deliver it to the target computer by replacing files that the target machine downloads or backdooring the downloaded files on the fly.
  5. Detection & Protection: In this section you will learn three methods to detect  ARP Poisoning Attacks, you will also learn how to use Wireshark to detect other suspicious activities in your network. We will also discuss how to protect against these MITM attacks and prevent them from happening. Finally you will learn how to detect backdoors that can bypass antivirus programs and check file integrity to ensure that they have not been backdoored.

 

Requirements:

  • Basic IT skills.
  • Some Experience Using Android.
  • An Android device preferably a Nexus device or OnePlus One phone.

 

Who this course is for:

  • Anybody interested in hacking/penetration testing.
  • Anybody interested in learning how to use Android to test the security of computer systems

 

NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

NOTE: This course is totally a product of Zaid Sabih & zSecurity and No other organization is associated for certification exam for the same.

Course Features

  • Lectures 46
  • Duration 4.5 hours
  • Skill level All levels
  • Language English
  • Students 6017
  • Assessments Yes
  • Introduction 0/1

  • Weaponizing 0/6

    • Lecture2.1
      Preparing Your Android Device
      2m
    • Lecture2.2
      Installing & Configuring Nexus Root Toolkit
    • Lecture2.3
      Installing Device Drivers
    • Lecture2.4
      Unlocking & Rooting The Device
    • Lecture2.5
      Installing NetHunter
    • Lecture2.6
      NetHunter Preview and Lab Overview
      5m
  • Installing Kali Linux As Virtual Machine (Optional) 0/2

    • Lecture3.1
      Installing Kali 2018 As a Virtual Machine
      8m
    • Lecture3.2
      Basic Overview of The Operating System
      7m
  • Information Gathering 0/5

    • Lecture4.1
      Discovering Wireless Networks – Wardriving
      8m
    • Lecture4.2
      Preparing Your Device To Crack WiFi Keys/Passwords – WEP/WPA/WPA2
      7m
    • Lecture4.3
      Network Mapping – Discovering Devices Connected To The Network
      5m
    • Lecture4.4
      Network Mapping – Discovering Open Ports
      10m
    • Lecture4.5
      Network Mapping – Discovering Installed Services
      5m
  • Spying 0/2

    • Lecture5.1
      Introduction
      3m
    • Lecture5.2
      MITM (Man In The Middle) Methods
      4m
  • Spying > MITM Method 1 - Bad USB Attack 0/4

  • Spying > MITM Method 2 - ARP Poisonning 0/5

    • Lecture7.1
      What Is ARP Poisoning
      7m
    • Lecture7.2
      ARP Poisoning & Sniffing Data Using arpspoof
      7m
    • Lecture7.3
      ARP Poisoning & Sniffing Data Using Zanti2
      8m
    • Lecture7.4
      Intercepting Downloaded Files
      4m
    • Lecture7.5
      Replacing Images & Injecting Javascript Code
      6m
  • Spying > MITM Method 3 - Fake Access Point (Honey Pot) 0/4

    • Lecture8.1
      Fake Access Point Theory
      6m
    • Lecture8.2
      Configuring Access Point Settings
      5m
    • Lecture8.3
      Launching The Fake Access Point
      9m
    • Lecture8.4
      Sniffing Data Sent Over The Access Point
      6m
  • Detection & Protection 0/2

    • Lecture9.1
      Detecting ARP Poisoning Attacks
      5m
    • Lecture9.2
      Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning
      5m
  • Exploitation (Gaining Access) 0/9

    • Lecture10.1
      Introduction
      2m
    • Lecture10.2
      Bypassing Windows/OSX Logins – Setup
      5m
    • Lecture10.3
      Bypassing Windows/OSX Logins
      4m
    • Lecture10.4
      Creating An Undetectable Backdoor
      7m
    • Lecture10.5
      Using Metasploit Meterpreter
      9m
    • Lecture10.6
      Replacing Downloads With A Backdoor
      6m
    • Lecture10.7
      Backdooring Downloads On The Fly
      7m
    • Lecture10.8
      HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB
      7m
    • Lecture10.9
      HID Keyboard Attack – Gaining Full Control Over Windows Machine
      9m
  • Exploitation - Rubber Ducky Scripts 0/4

  • Detecting Malicious Files 0/2

    • Lecture12.1
      Protecting Yourself Against Backdoor Delivery Methods
      4m
    • Lecture12.2
      Detecting Undetectable Backdoors
      3m
Avatar
Zaid Sabih

Ethical Hacker, Pentester & Computer Scientist

My name is Zaid Al-Quraishi, I am an ethical hacker, a computer scientist, and the founder and CTO of zSecurity. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. I studied computer science in University College Dublin, I graduated in may 2016. I have a very good experience in ethical hacking, I started making video tutorials back in 2009 in an ethical hacking community (iSecuri1ty.org), I also worked as a pentester for the same company. In 2013 I started teaching my first course online in Arabic, this course received amazing feedback which motivated me to create an English version of this course. The english course became the most popular and the top paid course in Udemy for almost a year, this motivated me to make more courses on ethical hacking, now I have a number of courses on ethical hacking and more than 200,000 students on Udemy and other teaching platforms such as StackSocial, StackSkills and zSecurity.

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0
$100.00 $25.00