5.00
(1 Rating)

Learn Hacking Using Android From Scratch

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Learn Hacking Using Android From Scratch is a tutorial from Udemy that teaches you how to use an Android device to hack networks and systems or prevent system intrusion. This course will first introduce you to the basics like preparing an Android mobile device and computer and installing the necessary applications on it, and finally show you how to have complete control over different systems using hacking. . This tutorial focuses on the practical and theory of intrusion testing and helps you prepare to run the attack or prevent intrusion.

The course is divided into four main sections. In the first part, we will teach you how to set up a mobile computer, how to install NetHunter software on Android, and how to install Cali Linux on your computer. The second part deals with gathering information over the WiFi network and identifying the devices connected to it and information such as their IP address, MAC address, and operating system. In part three, you will learn how to use the information gained and launch the MITM attack. In the final section, you will learn how to use and extract information and learn data protection techniques.

Show More

What Will You Learn?

  • Android device training for network and system hacking
  • Root and open boot loader for Android devices
  • Spy On Systems
  • Full access and control of Windows / OSX / Linux systems
  • Cross the OSX / Windows login page
  • Build fake access points and view user activities
  • Install NetHunter and Kali Linux
  • Detect all nearby WiFi networks
  • Identify devices connected to a network
  • Attack Prevention Training

Course Content

01. Introduction

  • A Message from the Professor
  • 001. Course Intro & Overview.mp4
    00:00

02. Weaponizing

03. Installing Kali Linux As Virtual Machine (Optional)

04. Information Gathering

05. Spying

06. Spying MITM Method 1 – Bad USB Attack

07. Spying MITM Method 2 – ARP Poisoning

08. Spying MITM Method 3 – Fake Access Point (Honey Pot)

09. Detection & Protection

10. Exploitation (Gaining Access)

11. Exploitation – Rubber Ducky Scripts

12. Detecting Malicious Files

13. Bonus Section

Student Ratings & Reviews

5.0
Total 1 Rating
5
1 Rating
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
OH
4 months ago
excellent

Want to receive push notifications for all major on-site activities?

×