Learn Kali Linux To Hack Android Devices

Learn Kali Linux To Hack Android Devices

Instructed by Mohamed Atef

Access all courses with Premium Subscription

  • Monthly
  • Yearly

Monthly

$ 29/mo
Billed Monthly
  • All Courses Access
  • New Courses Instant Access
  • Learning paths Access
  • Course completion certificates
  • Skills Assessment
  • Instructor Support
  • Exercise files & Quizzes
  • Resume & Play
  • Mobile and TV apps
  • Offline viewing
  • Cancel Anytime
Subscribe Now

Yearly

$ 299/yr
Billed Anually
  • One Year Unlimited Access
  • New Courses Instant Access
  • Learning paths Access
  • Course completion certificates
  • Skills Assessment
  • Instructor Support
  • Exercise files & Quizzes
  • Resume & Play
  • Mobile and TV apps
  • Offline viewing
  • Cancel Anytime
Subscribe Now
  • Learn Basic Hacking Skills
  • Learn Kali Linux
  • Learn The Major Tools Of Kali Linux
  • Setup Testing Lab
  • Learn How To Hack Android Devices
  • Learn How To Hack Using Android Devices
  • Learn Exploitation Techniques
  • Learn Metasploit Basics

Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers  with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smart phones and tablet that use different platform like Android and doesn't have the same layers of security like PC's and accordingly peoples may think that their data is safe because they have an Anti Virus  and Firewall on their computers while the true is that all the data is replicated on their smart phone or another android devices that is very easy to compromise. 

This course consist of three different parts,first parts is about Kali Linux which will be used as Hacking platform, second part is about how to hack Android devices and third part is how to hack using Android devices, finally i would like to clarify that the course will be updated frequently with all new Android vulnerabilities and the exploitation techniques.

  • Basic knowledge of computer hardware, software, and operating systems
  • You
  • Students who are intersted in learning Hacking skills speically in Android platform.
  • Penetration Testers
View More...

Section 1 : Penetration Testing

  • Lecture 1 :
  • Lecture 2 :
  • Disclaimer
  • Lecture 3 :
  • Android Devices

Section 2 : Setup Your Lab

  • Lecture 1 :
  • Setup Your Virtual Machines
  • Lecture 2 :
  • Setting Your Workspace
  • Lecture 3 :
  • Setup Your Android Platform

Section 3 : Finding Your Way Around Kali

  • Lecture 1 :
  • Kali Linux
  • Lecture 2 :
  • Sharing Files Between Kali Linux And Windows
  • Lecture 3 :
  • Update and Upgrade Kali Packages

Section 4 : Important Tools

  • Lecture 1 :
  • Netcat
  • Lecture 2 :
  • Grabbing Banner
  • Lecture 3 :
  • Transferring Files With Netcat
  • Lecture 4 :
  • Remote Administration Using Netcat
  • Lecture 5 :
  • Android Netcat
  • Lecture 6 :
  • Ettercap
  • Lecture 7 :
  • Ettercap Basic
  • Lecture 8 :
  • DNS Poisoning Using Ettercap
  • Lecture 9 :
  • Scanning A System Using NMAP

Section 5 : Exploitation

  • Lecture 1 :
  • Working With Exploit
  • Lecture 2 :
  • Android Exploit
  • Lecture 3 :
  • Metasploit
  • Lecture 4 :
  • Armitage
  • Lecture 5 :
  • Different Armitage Usage

Section 6 : Hacking Android Devices

  • Lecture 1 :
  • Android Attack 1-1
  • Lecture 2 :
  • Android Attack 1-2
  • Lecture 3 :
  • Using Meterpreter Session
  • Lecture 4 :
  • Countermeasure
  • Lecture 5 :
  • Android Attack Using Armitage
  • Lecture 6 :
  • Stagefright Attack
  • Lecture 7 :
  • Countermeasure
  • Lecture 8 :
  • Social Engineering Toolkit
  • Lecture 9 :
  • Fix SET If Needed
  • Lecture 10 :
  • Android Attack 2
  • Lecture 11 :
  • Android Attack 3
  • Lecture 12 :
  • Countermeasure
  • Lecture 13 :
  • Install Notepad++ In Kali Linux
  • Lecture 14 :
  • Bind A Payload In A Regular APK

Section 7 : Social Engineering

  • Lecture 1 :
  • Spoof Email
  • Lecture 2 :
  • Countermeasure
  • Lecture 3 :
  • Spoofed Mobile Number
  • Lecture 4 :
  • Spoofed SMS
  • Lecture 5 :
  • Countermeasure

Section 8 : Hacking Using Android Devices

  • Lecture 1 :
  • Network Spoofer
  • Lecture 2 :
  • Root A Device
  • Lecture 3 :
  • Bugdroid
  • Lecture 4 :
  • DSPLOIT
  • Lecture 5 :
  • Countermeasure

Section 9 : Remote Attacks On Android

  • Lecture 1 :
  • Port Forwarding
  • Lecture 2 :
  • Hacking Remotely Demonstration

Mohamed Atef,

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
View More...

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

$15

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

$15

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

$15

Google TensorFlow Hands on with Pyt...

By : UNP United Network of Professionals

Lecture 51

$15

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

$15

Complete Ethical Hacking & Penetrat...

By : Abhilash Nelson

Lecture 29

$15

Need any help with the platform? Contact us at: support@learnfly.com