Learn Kali Linux To Hack Android Devices

Learn Kali Linux To Hack Android Devices

Best Seller 3.5 ( 1 ratings)

Instructed by Mohamed Atef

Want to access all courses?
Go for a premium subscription

  • Monthly
  • Yearly

Monthly

$ 29/mo
Billed Monthly
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
Subscribe Now

Yearly

$ 299/yr
Billed Annually
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
Subscribe Now
  • Learn Basic Hacking Skills
  • Learn Kali Linux
  • Learn The Major Tools Of Kali Linux
  • Setup Testing Lab
  • Learn How To Hack Android Devices
  • Learn How To Hack Using Android Devices
  • Learn Exploitation Techniques
  • Learn Metasploit Basics

Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers  with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smart phones and tablet that use different platform like Android and doesn't have the same layers of security like PC's and accordingly peoples may think that their data is safe because they have an Anti Virus  and Firewall on their computers while the true is that all the data is replicated on their smart phone or another android devices that is very easy to compromise. 

This course consist of three different parts,first parts is about Kali Linux which will be used as Hacking platform, second part is about how to hack Android devices and third part is how to hack using Android devices, finally i would like to clarify that the course will be updated frequently with all new Android vulnerabilities and the exploitation techniques.

  • Basic knowledge of computer hardware, software, and operating systems
  • You
  • Students who are intersted in learning Hacking skills speically in Android platform.
  • Penetration Testers
View More...

Section 1 : Penetration Testing

  • Lecture 1 :
  • Lecture 2 :
  • Disclaimer
  • Lecture 3 :
  • Android Devices

Section 2 : Setup Your Lab

  • Lecture 1 :
  • Setup Your Virtual Machines
  • Lecture 2 :
  • Setting Your Workspace
  • Lecture 3 :
  • Setup Your Android Platform

Section 3 : Finding Your Way Around Kali

  • Lecture 1 :
  • Kali Linux
  • Lecture 2 :
  • Sharing Files Between Kali Linux And Windows
  • Lecture 3 :
  • Update and Upgrade Kali Packages

Section 4 : Important Tools

  • Lecture 1 :
  • Netcat
  • Lecture 2 :
  • Grabbing Banner
  • Lecture 3 :
  • Transferring Files With Netcat
  • Lecture 4 :
  • Remote Administration Using Netcat
  • Lecture 5 :
  • Android Netcat
  • Lecture 6 :
  • Ettercap
  • Lecture 7 :
  • Ettercap Basic
  • Lecture 8 :
  • DNS Poisoning Using Ettercap
  • Lecture 9 :
  • Scanning A System Using NMAP

Section 5 : Exploitation

  • Lecture 1 :
  • Working With Exploit
  • Lecture 2 :
  • Android Exploit
  • Lecture 3 :
  • Metasploit
  • Lecture 4 :
  • Armitage
  • Lecture 5 :
  • Different Armitage Usage

Section 6 : Hacking Android Devices

  • Lecture 1 :
  • Android Attack 1-1
  • Lecture 2 :
  • Android Attack 1-2
  • Lecture 3 :
  • Using Meterpreter Session
  • Lecture 4 :
  • Countermeasure
  • Lecture 5 :
  • Android Attack Using Armitage
  • Lecture 6 :
  • Stagefright Attack
  • Lecture 7 :
  • Countermeasure
  • Lecture 8 :
  • Social Engineering Toolkit
  • Lecture 9 :
  • Fix SET If Needed
  • Lecture 10 :
  • Android Attack 2
  • Lecture 11 :
  • Android Attack 3
  • Lecture 12 :
  • Countermeasure
  • Lecture 13 :
  • Install Notepad++ In Kali Linux
  • Lecture 14 :
  • Bind A Payload In A Regular APK

Section 7 : Social Engineering

  • Lecture 1 :
  • Spoof Email
  • Lecture 2 :
  • Countermeasure
  • Lecture 3 :
  • Spoofed Mobile Number
  • Lecture 4 :
  • Spoofed SMS
  • Lecture 5 :
  • Countermeasure

Section 8 : Hacking Using Android Devices

  • Lecture 1 :
  • Network Spoofer
  • Lecture 2 :
  • Root A Device
  • Lecture 3 :
  • Bugdroid
  • Lecture 4 :
  • DSPLOIT
  • Lecture 5 :
  • Countermeasure

Section 9 : Remote Attacks On Android

  • Lecture 1 :
  • Port Forwarding
  • Lecture 2 :
  • Hacking Remotely Demonstration

Mohamed Atef,

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
View More...

Average Rating

3.5

Detail

5 Stars
0% Complete (success)
0%
4 Stars
0% Complete (success)
0%
3 Stars
100% Complete (success)
100%
2 Stars
0% Complete (success)
0%
1 Stars
0% Complete (success)
0%

amurta rao

posted 2 months ago

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

Buy

$29

Need any help with the platform? Contact us at: support@learnfly.com