Learn Hacking Using Android From Scratch [Video]
-
Free ChapterIntroduction
-
Weaponizing
-
Installing Kali Linux As Virtual Machine (Optional)
-
Information Gathering
-
Spying
-
Spying > MITM Method 1 - Bad USB Attack
-
Spying > MITM Method 2 - ARP Poisoning
-
Spying > MITM Method 3 - Fake Access Point (Honey Pot)
-
Detection & Protection
-
Exploitation (Gaining Access)
- Introduction
- Bypassing Windows/OSX Logins – Setup
- Bypassing Windows/OSX Logins
- Creating an Undetectable Backdoor
- Using Metasploit Meterpreter
- Replacing Downloads With a Backdoor
- Backdooring Downloads On the Fly
- HID Keyboard Attack- Executing Windows Commands on Target Computer via USB
- HID Keyboard Attack - Gaining Full Control over Windows Machine
-
Exploitation - Rubber Ducky Scripts
-
Detecting Malicious Files
Welcome to this comprehensive course on using Android as a penetration testing tool. You will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps, and will finish up with examples of real-life scenarios that will give you full control over various computer systems. This course focuses on the practical side of penetration testing without neglecting the theory behind each attack. For each attack you will learn how that attack works and then you will learn how to practically launch that attack. This will give you a full understanding of the conditions which allow this attack to be successfully executed, and will help you to detect (and sometimes prevent) this attack from happening. The attacks explained in this course are launched against real devices.
Style and Approach
Hands-on course on using Android as a penetration testing tool, you will start as a beginner with no previous knowledge about penetration testing.
- Publication date:
- April 2018
- Publisher
- Packt
- Duration
- 4 hours 15 minutes
- ISBN
- 9781789341447