Learn Hacking/Penetration Testing using Android From Scratch
4.4 (150 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
4,861 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Learn Hacking/Penetration Testing using Android From Scratch to your Wishlist.

Add to Wishlist

Learn Hacking/Penetration Testing using Android From Scratch

Learn how to use Android as an ethical hacking tool to test the security of networks and computer systems.
4.4 (150 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
4,861 students enrolled
Created by Zaid Sabih
Last updated 5/2017
English
Learn Fest Sale
Current price: $10 Original price: $100 Discount: 90% off
3 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 4.5 hours on-demand video
  • 5 Articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • 45 Lectures to teach you how to use your android device to hack into other computers & networks to test their security
  • Root and unlock your Android device (For nexus devices only)
  • Install NetHunter on your Android Device (For nexus devices only)
  • Install other apps needed for penetration testing
  • Install Kali Linux as a virtual machine inside windows or OSX
  • Discover all wifi networks around you and gather information about them
  • Prepare your Android device to be used to crack Wi-Fi passwords (WEP/WPA/WPA2)
  • Discover devices in the same network & their OS, open ports, running services ...etc
  • Create a fake access point with internet connection & spy on clients
  • Spy on computers wirelessly (ARP Spoofing) or by connecting to them using the USB cable (BadUSB Attack)
  • Carry out a number of man-in-the-middle attacks
  • Analyse packet files using Wireshark
  • Bypass OSX/Windows login screens
  • Setup your android device to execute OS commands as soon as connected to a target computer
  • Gain full control over Windows/OSX/Linux devices as soon as you connect your Android device to them
  • Gain full control over any computer in the same network using a number of methdos
  • Combine a number of methods to represent real life senarios
  • Secure yourself against the discussed attacks
View Curriculum
Requirements
  • Basic IT skills
  • An Android device preferably a Nexus device or OnePlus One phone
Description

Notes:

  • All the videos in this course are downloadable.


Welcome to my comprehensive course on using Android as a penetration testing tool, you will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps and will finish up with examples of real life scenarios that will give you full control over various computer systems.

This course focuses on the practical side penetration testing without neglecting the theory behind each attack, for each attack you will learn how that attack works and then you will learn how to practically launch that attack, this will give you full understanding of the conditions which allow this attack to be successfully executed, this knowledge will help you to detect and sometimes prevent this attack from happening. The the attacks explained in this course are launched against real devices in my lab.

The Course is Divided into four main sections:

  1. Preparing: this section will take you through the steps of of preparing your computer and installing NetHunter (an Android penetration testing platform) on your Android device. You will also learn how to use the main menus of NetHunter, and as a bonus I added three lectures to teach you how to install Kali Linux (a penetration testing OS) on your computer.
  2. Information Gathering:in this section we still don't know much about penetration testing , all we have is an Android device with NetHunter installed on it, you will learn how to start gathering information about WiFi networks around you, not only that but you will also learn how to map your current networking, displaying the connected devices and information about them such as their IP address, Mac Address, OS, open ports and running services/programs. You will also learn how to connect an external wireless card to your Android device and prepare it to be used to crack WiFi keys.
  3. Spying: In this section you will learn  what is meant by MITM (Man In The Middle) and how to use your Android device to achieve it using three methods. Being the MITM will allow you to gain access to any account accessed by devices in your network, or accounts accessed by the device which your Android device is connected to via USB. You will also learn how to create a fake access point and spy on all the data sent on it. 
  4. Exploitation: In this section we will have a look on a number of exploitation methods that can be used to to gain full control over your target computer weather it runs Windows/Linux/OSX only by connecting your Android device to the target computerYou will also learn why you should never leave your computer locked on a login screen as you will see login screens can be bypassed on both OSX and Windows (ie: you'll be able to login without a password to Windows and OSX machines). Finally you will learn how to make an undetectable backdoor and deliver it to the target computer by replacing files that the target machine downloads or backdooring the downloaded files on the fly.
  5. Detection & Protection: In this section you will learn three methods to detect  ARP Poisoning Attacks, you will also learn how to use Wireshark to detect other suspicious activities in your network. We will also discuss how to protect against these MITM attacks and prevent them from happening. Finally you will learn how to detect backdoors that can bypass antivirus programs and check file integrity to ensure that they have not been backdoored.

NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test.

NOTE: This course is totally a product of Zaid Sabih and No other organization is associated for certification exam for the same. Although, you will receive Course Completion Certification from Udemy, apart from that No OTHER ORGANIZATION IS INVOLVED.

Who is the target audience?
  • Anybody who is interested in hacking/penetration testing
  • Anybody who is interested in learning how to use Android to test the security of computer systems
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 48 Lectures Collapse All 48 Lectures 04:24:31
+
Introduction
1 Lecture 02:56

This is just an overview of what you will learn in the course, it shows the course outline, main sections of the course and the main subjects of each section.

Preview 02:56
+
Weaponizing
6 Lectures 11:01

This lecture explains what you need to do in order to prepare your Android device for penetration testing, it will not go in detail of how to do each step as that is explained in the next lectures.

Preview 02:09

Installing & Configuring Nexus Root Toolkit
00:49

Installing Device Drivers
00:40

Unlocking & Rooting The Device
00:50

Installing NetHunter
00:55

This lecture will just give you a quick view of the home menu of NetHunter, it will also show you the lab that I will be using during this lecture.

NetHunter Preview and Lab Overview
05:37
+
Installing Kali Linux As Virtual Machine (Optional)
3 Lectures 21:28

This lecture will give you an overview of what software you need to install for this course, and how it can be installed.

You will also see how to install Kali as a virtual machine.

Preview 04:21

In this lecture you will learn how to install Kali Linux using the iso image.

Skip this lecture if the method above works for you and you're happy enough with it.

Preview 10:01

In this lecture we will have a basic look on Kali linux just to get you comfortable with using it.

Preview 07:06
+
Information Gathering
5 Lectures 36:22

This lecture will show you how to discover all WiFi networks around you, you will also be able to see important information about these networks and how far they are.

Discovering Wireless Networks - Wardriving
07:46

This lecture shows you how to prepare your Android device to be used in cracking WiFi keys.

Once this is done the cracking process is the same weather it is from your phone or laptop, there fore it is not explained in this course as it is not specific to Android devices.

I have a full course explaining how to crack WiFi keys, so if you are interested into learning that please send me a private message and I will give you that course for $10 only.

Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2
07:37

This lecture will show you how to use Wifi Analyser to discover the connected devices to your network, this is a quick method but will only show basic info about these devices.

Network Mapping - Discovering Devices Connected To The Network
05:22

In this lecture we will use a new app called Zanti2, we will use it to discover connected devices and show more info about them than the previous method such as the open ports in the discovered devices.

Network Mapping - Discovering Open Ports
10:01

In this lecture, we will use Zanti's advanced scan option which uses nmap to show more info about the connected devices such as the services (programs) that use the open ports we discovered in the previous vidoe.

Network Mapping - Discoverig Installed Services
05:36
+
Spying
2 Lectures 06:58

This lecture will give you an overview of the attacks and concepts that you will learn in this section of the course.

This section will cover a number of attacks to spy on a target and capturing sensitive data such as usernames and passwords.

Introduction
03:10

This lecture will give you a brief description of each MITM (Man In The Middle) attack that you will learn in this section, these attacks will basically place you in the middle of the connection between you and the target, allowing you to capture and read everything the target send or recieve, not only that but you'll also be able to modify the data sent/recieved

Preview 03:48
+
Spying > MITM Method 1 - Bad USB Attack
4 Lectures 29:24

This is the first method that you will learn on becoming the man in the middle, this attack works by connecting your device to any computer (MAC/Linux/Windows), once you connect your Android to the target device, the android device will fool the target device that it is a network card forcing all the traffic to be redirected through your device, this means that anything the target person does on the internet (including usernames and passwords) will flow through your Android device which allows you to read/modify this info.

What Is The Bad USB Attack & How To Launch It
07:39

After launching the badUSB attack, the data will flow through the device, in this lecture you will learn how to store this data on file and read it using Wireshark.

Preview 07:19

In this lecture we shall learn how to bypass HTTPS/SSL so that we can sniff passwords from HTTPS enabled web pages such as hotmail and yahoo.

Bypassing HTTPS
07:35

In this video we shall learn how to control DNS requests made by the target computer. 

This can be very useful in many cases, for example redirect requests from live.com to a fake login page or to a paeg asking them to download a backdoored update.

DNS Spoofing
06:51
+
Spying > MITM Method 2 - ARP Poisonning
5 Lectures 28:19

In this lecture you will learn how ARP Poisoning works, one of the most dangerous and effective MITM attacks.

What Is ARP Poisoning
06:43

This video will teach you how to use a tool called arpspoof to arp poison a network and become the man in the middle.

ARP Poisoning & Sniffing Data Using arpspoof
07:02

This video show you how to use Zanti2 to do arp poisoning.

ARP Poisoning & Sniffing Data Using Zanti2
07:42

This video shows you how to capture downloaded files and replace them with any other file.

Preview 04:16

Here we will have a look on other attacks that you can do while being the man in the middle like replacing all images loaded by the target person, injecting html code and executing java script at the target computer.

Replacing Images & Injecting Javascript Code
02:36
+
Spying > MITM Method 3 - Fake Access Point (Honey Pot)
4 Lectures 26:32

This is the 3rd method to become the man in the middle, in this method we will create a fake AP with internet connection so that when people connect to it we will automatically be the man in the middle.

Fake Access Point Theory
05:59

In this video we well have a look on Mana-Toolkit (the tool that we will use to create the fake AP) and the setup we need to successfully run a fake access poing.

Configuring Access Point Settings
05:36

In this lecture you will learn how to configure mana and start the AP.

Launching The Fake Access Point
08:45

In this video you will learn how to store the data sent in the fake AP and analyse it to find sensitive data such as passwords.

Sniffing Data Sent Over The Access Point
06:12
+
Detection & Protection
2 Lectures 09:45

In this lecture we shall learn two methods to detect ARP poisoning attacks.

Detecting ARP Poisoning Attacks
05:02

In this lecture we shall learn how to use Wireshark to detect ARP Poisoning attacks and other suspicious activities in the network, we will also learn how to protect against ARP Poisoning attacks.

Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning
04:43
+
Exploitation (Gaining Access)
9 Lectures 01:04:20

This lecture will give you a quick overview of the methods and attacks that you will learn in this section.

In this section you will learn a number of attacks that will give you full control over the target computer.

ntroduction
02:38

In this video you will lean how to set up your Android device so that it can be used to login to Windows and OSX computers without a password.

Bypassing Windows/OSX Logins - Setup
05:36

This video shows you how to bypass Windows and OSX logins using your android device., ie: logging in without a password.

Preview 04:35

This lecture will teach you how to create an undetectable backdoor.

Creating An Undetectable Backdoor
07:26

Here you will learn how to use the metasploit meterpreter after hacking a certain device.

You will learn how to browse the file system, download/upload files, start a key logger and much more!

Using Metasploit Meterpreter
09:15

In this lecture we will use the backdoor we created earlier and replace any downloaded exe with that backdoor.

Replacing Downloadeds With A Backdoor
05:51

In this video you will learn how to backdoor exe's as they are being downloaded, this means that the downloaded file will work perfectly but at the same time it will execute your backdoor.

Backdooring Downloads On The Fly
12:49

In this lecture you will learn how to program your android device to execute windows commands when it's connected to a Windows computer via USB.

HID Keyboard Attack- Executing Windows Commands On Target Computer Via USB
07:03

In this lecture we will use the same method as before, but we will gain full access to the target computer using the powersploit option.

HID Keyboard Attack - Gaining Full Control Over Windows Machine
09:07
3 More Sections
About the Instructor
Zaid Sabih
4.6 Average rating
8,190 Reviews
67,398 Students
8 Courses
Ethical Hacker, Pentester & Computer Scientist

My name is Zaid Al-Quraishi , I am an ethical hacker, pentester and a computer scientist. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker. 

I have a very good experience in ethical hacking. I started making video tutorials since 2009 in an ethical hacking website (iSecuri1ty), I received very good feedback for my tutorials which lead to promoting me as an editor in the website. I also work in the penetration testing team of iSecur1ty.

In 2013 I started teaching my first course online in the training center in iSecur1ty, again this course received amazing feedback for learners, which motivated me to create an English version of this course.

The english course was the most popular and the top paid course in Udemy for almost a year, again the feedback was amazing, therefore I decided to make more courses on ethical hacking, so I released a number of other courses which are doing just as good as that one.

My method of teaching is mostly by example, so I usually start by explaining the theory behind each technique, then I show you how it actually works in a real life situation.