English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1 Hour | 760 MB
Learn how to Hack and Secure Android Using Kali Linux
Hello, Welcome to my course Android Hacking And Security Using Kali Linux. In this course you will learn how to Hack and Secure your Android device from scratch, you don’t need to have any prior knowledge about Hacking, Kali Linux, Android and even Computers. This course is designed for everyone out there who want to learn how to Hack and Secure their Android device.
Why should you take this course?
Android is the most used smartphone in the world. Everybody keep all their important data like Emails, Contacts, Messages, and other Personal Files on their smartphones and the most alarming thing is smartphones are not as secure as our personal computers. In this course you’ll learn all the methods used to hack android devices and most importantly you’ll also learn how to Secure Android Devices.
This is a comprehensive and Hands-on Course, I’ll teach you everything from scratch e.g setting up your own Hacking Lab then I’ll teach you how to Prepare your Kali Linux, after that you’ll learn some important Linux Terminal Commands, then I’ll teach you how to generate Remote Administration Tools and Undetectable Payloads, after that we will start hacking our Android OS, You will also learn Social Engineering Techniques and in the end you will learn How To Use Those Tools Over WAN which is the most important part of learning Ethical Hacking but most other online courses skip this part.
What Will I Learn?
- Secure Android Devices
- Learn Hacking Android Devices
- Learn Ethical Hacking
- Install Android OS on VirtualBox
- Install Kali Linux on VirtualBox
- Learn Ethical Hacking Over WAN
1 Course Intro
2 Installing VirtualBox
3 Installing Kali Linux on VirtualBox
4 Installing Android OS on VirtualBox
Preparing Kali Linux
5 Updating Kali Linux
6 Installing TheFatRat
Basic Terminal Commands
7 Basic Terminal Commands
8 Cloning a Website
9 Using Beef Framework
10 Backdooring Original Android Applications
11 Listening For Incoming Connections Using Metasploit
12 Using Armitage
13 Uploading Apk To Online File Hosting Site
14 Changing The URL
15 Email Spoofing
Using The Above Attacks Over WAN
16 Configuring The Router To Forward Incoming Connections To Kali Linux
17 Using Beef Hook Over WAN
18 Using The Fat Rat Over WAN