Become Master in Ethical Hacking with Android (without Root)
4.0 (250 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
14,611 students enrolled

Become Master in Ethical Hacking with Android (without Root)

Learn Ethical Hacking Using Android From Scratch
4.0 (250 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
14,611 students enrolled
Created by Muhammad Ali
Last updated 11/2019
English
English [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Install Ubuntu ROOT Terminal on your Android Device
  • Install other apps needed for penetration testing
  • These lectures are used to teach you how to use your Android Device(Without Root) to hack other computers and Android devices to test their Security level.
  • Gather important information about your target.
  • Email Spoofing -Send E-Mail Using Fake or Other Person's E-Mail.
  • Create a KEYLOGGER in android.
  • Create Your Own Phishing App(Application).
  • Stress Testing.
  • Create a fake login page and use it to stead passwords.
  • Capture keystrokes on a compromised system.
  • Secure yourself against the above discussed attacks.
Requirements
  • Some Experience Using Android
  • Basic IT skills
Description

This is extremely helpful for the individuals who need to begin hacking utilizing their Android Phone without Rooting the Device.

Have you always been interested in IT? Did you want to be a professional hacker for as long as you remember? If so, then you have come to the right place - in this course, you will learn all about ethical hacking and penetration testing. You’ll get the best of both worlds - you’ll be able to live out your dream of becoming a hacker while not doing anything illegal that could get you fined or - even worse - locked behind bars. But in order to learn how to hack, you must first know what is ethical hacking and penetration testing.

What is Penetration Testing?

If you’ve never heard about ethical hacking and all of the other terms associated with it, you might be quite confused. Here I am, talking about hacking people and not being punished for it like it’s the easiest concept in the world. As a matter of fact, however - it actually is! Ethical hacking and penetration testing have been the go-to terms of every network administrator for the longest time now. This type of hacking is legal because it is concerned about with advancing network security, rather than breaking it down and breaching it.

Any and all IT-based, network activity-oriented companies do require ethical hackers as employees to test out if the network is properly secured or not. This is where penetration testing comes in - the network is bombarded with various different attacks to see if it will break, and if it will, then which of the attacks will be the successful one. This type of a job is perfect for people who want to learn how to hack and are super interested in the topic, yet don’t want to get in trouble while practicing / actually doing it. This way, you are able to exercise your passion and even get paid for doing so.


What You’ll Learn??

You might be thinking - Why should I take this course to learn penetration testing? Why should I even bother  there are so many free tutorials online! Although that is true as a statement, I offer you a very simple reason to motivate your choice in picking this course as your source of knowledge and information on network security maintenance - experience. The course is based on my own personal experience as a network security researcher. Having already spent some time in the industry, I was able to distinguish the varying trends and requirements for ethical hacking professionals. This course is centered around Android - you’ll learn Android penetration testing, how to create and test keyloggers, how to use Ubuntu and so on.

The only requirements for the course are for you to be familiar with Android (having used it before) and some very basic knowledge on how IT works, in general. Everything else will be provided within the course. Also, ready your passion for learning a new skill - if you’re a true IT enthusiast, you will surely appreciate ethical hacking (both from practical and philosophical standpoints) and all of the sub-topics that surround it. So, don’t hesitate - dive straight on in and I’ll see you on the other side!


NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test. 


Who this course is for:
  • People who want to learn ethical hacking.
  • People who want to learn how hackers hack into secure systems that do not have any vulnerabilities.
Course content
Expand all 43 lectures 01:39:53
+ Termux Basic Operations
8 lectures 17:20

- INSTALL GIT

apt install git

- INSTALL PROOT 

apt install proot

- INSTALL WGET 

apt install wget

- CLONE UBUNTU SCRIPT 

git clone https://github.com/Neo-Oli/termux-ubuntu.git

- GOTO TERMUX-UBUNTU FOLDER

cd termux-ubuntu

- CHANGE PERMISSION 

chmod +x ubuntu.sh

- EXECUTE SCRIPT

./ubuntu.sh

Ubuntu ROOT Terminal Installation
02:28
Installing Advanced Hacking Tools
01:42
Steganography-How to Hide Data Behind Any Image
02:21
+ Network Scanning
5 lectures 05:40
Finding Live or UP Hosts in Network
01:10
Listing Open Ports On a Target Host
01:21
Generating a Scan Report
01:28
+ Denial of Service (DoS) attacks Demonstrated and explained
3 lectures 07:02
Things You will Learn
00:31
Performing DOS Attack with Termux
04:27
Performing DOS Attack without Termux
02:04
+ Exploitation
12 lectures 33:25
Introduction and Installing Metasploit Framework on Termux
02:28
Extract Email Address of Domain using Metasploit
02:17
Hack Windows Machine By Creating a Backdoor-Msfvenom Payload With Netcat
03:18
Hacking windows Machine with Metasploit
03:26
Hack Linux Systems by Generating a more Advanced Backdoor
03:05
Hacking an Android Device with MSFvenom
03:08
Capturing keystrokes with Metasploit
01:31
Meterpreter Basic Commands
02:20
Generate Payloads and Control Remote Machines
05:15
Continuing -Generate Payloads and Control Remote Machines
03:36
Get Every Single Saved Password From Victim Machine
02:40
+ Social Engineering Attacks
3 lectures 05:47
Performing a Phishing Attack to steal Victim credentials
03:18
Creating a KEYLOGGER On Android
02:11
+ Using The Above Attacks Outside The Local Network
7 lectures 23:03
Ngrok Installation,Configuration and Port Forwarding
02:51
Hack Any Windows Machine Outside LAN
05:14
Remotely Hack Any Android Device with Metasploit- Hack Over WAN
04:35
Phishing Attack outside LAN Using Ngrok
03:26
Phishing Attack Over Wan without Termux
02:50
Creating Your Own Phishing App(Application)
03:45
+ How to Be Safe From Above Attacks
3 lectures 06:37
How to Detect Spoof Emails
01:56
How To Detect Trojans
02:53
How to Detect Phishing Page
01:48