Udemy - Learn Penetration Testing using Android From Scratch_Sin

seeders: 0
leechers: 0
Added on June 28, 2016 by Sinin Other > Tutorials
Torrent verified.



Udemy - Learn Penetration Testing using Android From Scratch_Sin (Size: 1.14 GB)
 001 Course Overview.mp479.9 MB
 001 Installing NetHunter Installer Drivers.html3.37 KB
 001 Preparing Your Android Device.mp412.58 MB
 002 NetHunter Preview and my lab.mp413.21 MB
 002 Unlocking the device.html3.06 KB
 003 Installing NetHunter and Rooting.html3.96 KB
 001 Intro About Kali Linux Installation Options.mp418.35 MB
 002 Installing Kali Linux using iso Image.mp418.62 MB
 003 Final Setup.mp414.55 MB
 001 Discovering Wireless Networks - Wardriving.mp420.79 MB
 002 Preparing Your Device To Pentest WiFi Keys - WEPWPAWPA2.mp436.59 MB
 003 Basic Network Mapping - Using Wifi Analyzer.mp47.54 MB
 004 Basic Network Mapping Using Zanti2.mp435.47 MB
 005 Advanced Network Mapping Using Zanti2 Nmap.mp423.47 MB
 001 Spying Intro.mp421.09 MB
 002 MITM Man In The Middle Methods.mp425.13 MB
 003 MITM Method 1 - Bad USB Attack.mp427.62 MB
 004 MITM BadUSB Attack - Sniffing Data.mp437.5 MB
 005 MITM BadUSB Attack - Bypassing HTTPS.mp434.53 MB
 006 MITM BadUSB Attack - DNS Spoofing.mp416.68 MB
 007 MITM Method 2 - ARP Poisoning.mp416.55 MB
 008 ARP Poisoning using arpspoof.mp425.42 MB
 009 ARP Poisoning Using Zanti2.mp426.86 MB
 010 ARP Poisoning - Intercepting Downloaded Files.mp417.94 MB
 001 Exploitation Introduction.mp417.06 MB
 002 Bypassing WindowsOSX Logins - Setup.mp417.15 MB
 003 Bypassing WindowsOSX Logins.mp4142.85 MB
 004 HID Keyboard Attack- simple windows command.mp430.81 MB
 005 HID Keyboard Attack - Powersploit option.mp41.52 MB
 006 Using Metasploit Meterpreter.mp440.7 MB
 007 Using Veil Evasion.mp428.58 MB
 008 Rubber Ducky Scripts.mp422.66 MB
 009 Rubber Ducky Scripts - Download Execute.mp431.23 MB
 010 Ducky Scripts - OSX Shell.mp429.12 MB
 001 Detecting ARP Poisoning Attacks.mp418.99 MB
 002 Detecting Suspicious Activity in the Network Solutions to ARP Poisoning.mp420.68 MB

Description

Course Description

In this course you will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps and will finish up with examples of real life scenarios when testing the security of computer systems.

This course just like my other courses focuses on the practical side penetration testing without neglecting the theory behind each attack, for each attack you will learn how that attack works and then you will learn how to practically launch that attack, this will give you full understanding of the conditions which allow this attack to be successfully executed, this knowledge will help you to detect and sometimes prevent this attack from happening. The the attacks explained in this course are launched against real devices in my lab.

The Course is Divided into four main sections:

Preparing: this section will take you through the steps of of preparing your computer and installing NetHunter (an Android penetration testing platform) on your Android device. You will also learn how to use the main menus of NetHunter, and as a bonus I added three lectures to teach you how to install Kali Linux (a penetration testing OS) on your computer.

Information Gathering:in this section we still don't know much about penetration testing , all we have is an Android device with NetHunter installed on it, you will learn how to start gathering information about WiFi networks around you, not only that but you will also learn how to map your current networking, displaying the connected devices and information about them such as their IP address, Mac Address, OS and running services/programs. You will also learn how to connect an external wireless card to your Android device and prepare it to be used to pentest WiFi keys.

Spying: I this section you will learn what is meant by MITM (Man In The Middle), how people achieve that and how detect if you are being MITM'ed. We will disscuss three methods to become the MITM, these methods are: Bad USB MITM, ARP Poisoning and using a Honeypot point. When somebody becomes the MITM packets will flow through their device, you will learn how to store these packets, and analyse them later using Wireshark.

Exploitation: In this section we will have a look on a number of exploitation methods that can be used to compromise your device weather it runs Windows/Linux/OSX. First you will learn why you should never leave your computer locked on a login screen as you will see login screens can be bypassed on both OSX and Windows. You will also see why you should be careful when allowing people to charge their Android device from your computer as they can gain full access to your computer as soon as you an Android device is connected to it via USB. You will also see how downloaded files can be backdoored on the fly, this means that you should be very careful when downloading files from the internet even if you were downloading them from a trusted website, make sure the link is HTTPS and use the discussed ARP Spoof detection method to ensure that you are not being MITM'ed.

Detection & Protection: In this section you will learn three methods to detect ARP Spoofing/ ARP Poisoning Attacks, you will also learn how to user Wireshark to detect other suspicious activities in your network. We will also discuss how to protect against these MITM attacks and prevent them from happening.
NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.

What are the requirements?

Basic IT skills
An Android device preferably a Nexus device or OnePlus One phone

What am I going to get from this course?

45 Lectures to teach you hacking/penetration testing using Android
Learn how to use your android device in testing the security of networks & computer systems
Root and unlock your Android device (For nexus devices only)
Install NetHunter on your Android Device (For nexus devices only)
Install other apps needed for penetration testing
Install Kali Linux as a virtual machine inside windows or OSX
Discover all wifi networks around you and gather information about them
Prepare your Android device to be used to test the security of wifi keys (WEP/WPA/WPA2)
Learn how to map a network to display connected devices
Display information about each device such as it's OS, running services ...etc
Learn what we mean by MITM and how to achieve that in three methods
Learn what is the BadUSB MITM Attack
Learn what is ARP Poisoning and how to detect it
Learn what is a Honeypot & why are they so dangerous
Analyse packet files using Wireshark
DNS Spoof any request to any domain to another IP
Bypass OSX/Windows login screens
Setup your android device to execute OS commands as soon as connected to a target computer
Learn what is the HID keyboard attack
Combine a number of methods to represent real life senarios

What is the target audience?

Anybody who is interested in hacking/penetration testing
Anybody who is interested in learning how to use Android to test the security of computer systems

Sharing Widget


Download torrent
1.14 GB
seeders:0
leechers:0
Udemy - Learn Penetration Testing using Android From Scratch_Sin