Learn Kali Linux To Hack Android Devices

Learn Kali Linux To Hack Android Devices

Instructed by Mohamed Atef

  • Includes all Standard Features
  • Get Unlimited access to all the courses
  • No Contract. Cancel Anytime
Starting in just $19 / mo see all plans
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
  • Learn Kali Linux
  • Learn The Major Tools Of Kali Linux
  • Setup Testing Lab
  • Learn How To Hack Android Devices
  • Learn How To Hack Using Android Devices
  • Learn Exploitation Techniques
  • Learn Metasploit Basics

Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers  with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smart phones and tablet that use different platform like Android and doesn't have the same layers of security like PC's and accordingly peoples may think that their data is safe because they have an Anti Virus  and Firewall on their computers while the true is that all the data is replicated on their smart phone or another android devices that is very easy to compromise. 

This course consist of three different parts,first parts is about Kali Linux which will be used as Hacking platform, second part is about how to hack Android devices and third part is how to hack using Android devices, finally i would like to clarify that the course will be updated frequently with all new Android vulnerabilities and the exploitation techniques.

  • Basic knowledge of computer hardware, software, and operating systems
  • You
  • Students who are intersted in learning Hacking skills speically in Android platform.
  • Penetration Testers
View More...

Section 1 : Setup Your Lab

  • Lecture 1 :
  • Lecture 2 :
  • Disclaimer
  • Lecture 3 :
  • Android Devices
  • Lecture 4 :
  • Setup Your Virtual Machines
  • Lecture 5 :
  • Setting Your Workspace
  • Lecture 6 :
  • Setup Your Android Platform

Section 2 : Finding Your Way Around Kali

  • Lecture 1 :
  • Kali Linux
  • Lecture 2 :
  • Sharing Files Between Kali Linux And Windows
  • Lecture 3 :
  • Update and Upgrade Kali Packages

Section 3 : Important Tools

  • Lecture 1 :
  • Netcat
  • Lecture 2 :
  • Grabbing Banner
  • Lecture 3 :
  • Transferring Files With Netcat
  • Lecture 4 :
  • Remote Administration Using Netcat
  • Lecture 5 :
  • Android Netcat
  • Lecture 6 :
  • Ettercap
  • Lecture 7 :
  • Ettercap Basic
  • Lecture 8 :
  • DNS Poisoning Using Ettercap
  • Lecture 9 :
  • Scanning A System Using NMAP

Section 4 : Exploitation

  • Lecture 1 :
  • Working With Exploit
  • Lecture 2 :
  • Android Exploit
  • Lecture 3 :
  • Metasploit
  • Lecture 4 :
  • Armitage
  • Lecture 5 :
  • Different Armitage Usage

Section 5 : Hacking Android Devices

  • Lecture 1 :
  • Android Attack 1-1
  • Lecture 2 :
  • Android Attack 1-2
  • Lecture 3 :
  • Using Meterpreter Session
  • Lecture 4 :
  • Countermeasure
  • Lecture 5 :
  • Android Attack Using Armitage
  • Lecture 6 :
  • Stagefright Attack
  • Lecture 7 :
  • Countermeasure
  • Lecture 8 :
  • Social Engineering Toolkit
  • Lecture 9 :
  • Fix SET If Needed
  • Lecture 10 :
  • Android Attack 2
  • Lecture 11 :
  • Android Attack 3
  • Lecture 12 :
  • Countermeasure
  • Lecture 13 :
  • Install Notepad++ In Kali Linux
  • Lecture 14 :
  • Bind A Payload In A Regular APK

Section 6 : Social Engineering

  • Lecture 1 :
  • Spoof Email
  • Lecture 2 :
  • Countermeasure
  • Lecture 3 :
  • Spoofed Mobile Number
  • Lecture 4 :
  • Spoofed SMS
  • Lecture 5 :
  • Countermeasure

Section 7 : Hacking Using Android Devices

  • Lecture 1 :
  • Network Spoofer
  • Lecture 2 :
  • Root A Device
  • Lecture 3 :
  • Bugdroid
  • Lecture 4 :
  • DSPLOIT
  • Lecture 5 :
  • Countermeasure

Section 8 : Remote Attacks On Android

  • Lecture 1 :
  • Port Forwarding
  • Lecture 2 :
  • Hacking Remotely Demonstration

Mohamed Atef,

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
View More...
learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Amer

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

cissp-certification-introduction

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

practical-blockchain-smart-contracts-ethereum-solidity

Practical Blockchain & Smart Contra...

By : Abhilash Nelson

Lecture 40

Buy

$19

Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now

Sign up and start learning
By signing up. you agree to our Terms of Use and Privacy Policy
Forget Password