Learn Kali Linux and Hack Android Mobile devices
4.3 (115 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,197 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Learn Kali Linux and Hack Android Mobile devices to your Wishlist.

Add to Wishlist

Learn Kali Linux and Hack Android Mobile devices

Hack Android Phones and Tablets
4.3 (115 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,197 students enrolled
Created by Mohamed Atef
Last updated 1/2017
English
Curiosity Sale
Current price: $10 Original price: $80 Discount: 88% off
30-Day Money-Back Guarantee
Includes:
  • 5.5 hours on-demand video
  • 8 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn Basic Hacking skills
  • Learn Kali Linux
  • Learn the major tools of Kali Linux
  • Setup Testing lab
  • Learn hot to hack Android devices
  • Learn How to hack using Android devices
  • Learn Exploitation techniques
  • Learn Metasploit basics
View Curriculum
Requirements
  • Basic knowledge of computer hardware, software, and operating systems
Description

Most of today Ethical Hacking and Penetration testing courses are focusing on how to compromise computers  with Windows and Linux platform while right now most peoples are keeping all their critical data (Emails, Contacts, SMS, Personnel files) on Smart phones and tablet that use different platform like Android and doesn't have the same layers of security like PC's and accordingly peoples may think that their data is safe because they have an Anti Virus  and Firewall on their computers while the true is that all the data is replicated on their smart phone or another android devices that is very easy to compromise. 

This course consist of three different parts,first parts is about Kali Linux which will be used as Hacking platform, second part is about how to hack Android devices and third part is how to hack using Android devices, finally i would like to clarify that the course will be updated frequently with all new Android vulnerabilities and the exploitation techniques.


Who is the target audience?
  • You
  • Penetration Testers
  • Students who are intersted in learning Hacking skills speically in Android platform
Students Who Viewed This Course Also Viewed
Curriculum For This Course
49 Lectures
05:34:35
+
Penetration Testing
3 Lectures 18:00

During the introduction lecture i will explain the scope of the course, the course content and the flow if the course, i will also explain what make this ethical hacking course different than others EH courses.

Preview 13:46

Course disclaimer, very important to read before starting the course. 

Disclamer
00:54

What Android devices should you use during the course.

Android devices
03:20
+
Setup Your Lab
3 Lectures 21:11

During this lecture i will guide you on how to setup a testing lab. 

Preview 14:30

This lecture will guide you on how to install Kali Linux and how to configure it as  your work space.

Setting your Workspace
03:39

During this lecture i explained how to configure your Android device could be a phone or a tablet for testing.

Setup up your Android platform
03:02
+
Finding Your Way Around Kali
3 Lectures 21:26

During this lecture i will introduce you to Kali Linux , this is an important lecture for students who is new to Kali Linux.

Kali Linux
08:18

During this lecture i explained how to share files between Kali Linux and Windows to simplify copying files between the 2 platform dusting the course. 

Sharing files between Kali Linux and Windows
09:30

After installing Kali Linux , you need to update and upgrade the packages, this lecture will show you how, 

Update / Upgrade Kali Packages
03:38
+
Important Tools
9 Lectures 52:20

An excellent tool for hacking also know as Hacker Swiss army. 

Netcat
07:55

How to use Netcat to grab banners from open port and identify the service running on the victim machine.

Grabbing Banner
02:19

How to use Netcat to transfer files between devices. 

Transferring Files with Netcat
04:55

How to use Netcat for Remote Administration

Remote Administration using Netcat
02:42

Netcat can be used in different platform including Android and during the lecture i will show you some android netcat application 

Android Netcat
01:53

Ettercap is an amazing sniffering tools that can be used to capture traffic and is used in different attacks. 

Ettercap
07:08

Get familiar with Ettercap, how it work , different menu , how it can be used for effective attacks ?

Ettercap Basic
04:15

A very powerful attack using Ettercap where we will spoof the DNS and redirect our victim to any website we want. 

DNS Poising using Ettercap
11:12

NMAP is a very powerful tool in Kali Linux , in this lecture i will explain how to use the command line tool and the GUI as well. 

Scanning a system using NMAP
10:01
+
Exploitation
5 Lectures 46:57

What is a vulnerability (Weakness) in any system and how we use them to compromise the systems, this lecture will explain how we use to do that manually first then in the next lecture we will explain how to do that using a framework. 

Working with Exploit
11:18

How to search for Android vulnerability.

Android Exploit
04:31

Metasploit is one of the best exploitation framework , in this lecture i will explain the component of Metasploit framework and how to use it. 

Metasploit
12:52

Armitage is a graphical interface for Metasploit, in the lecture i will explain how to configure and start Armitage. 

Armitage
08:24

Another demonstration using Armitage.

Different Armitage usage
09:52
+
Hacking Android devices
14 Lectures 01:39:12

First android attack creating a malicious payload in a Android APK

Android Attack 1-1
08:00

First android attack creating a malicious payload in a Android APK

Android Attack 1-2
11:59

After getting access on the Victim android devices , what s next ?

Using Meterpreter session
03:23

What is the countermeasure for that attack ? 

Countermeasure
04:28

How to implement the same attack using Armitage

Android attack using Armitage
04:05

A major vulnerability in Android that was recently discovered, in this lecture i will explain how to compromise an android devices using the Stagefright. 

Stagefright Attack
09:01

What is the countermeasure for that attack ?

Countermeasure
02:53

SET is an excellent social engineering tool, this lecture will explain the tool.

Social Engineering Toolkit (SET)
04:41

Most Probably when you start SET for the first time, it need to be fixed first during this lecture i will explain to you how to fix this problem. 

Fix SET if needed
05:08

Another Android attack

Android Attack 2
13:28

Another android attack

Android Attack 3
08:25

What is the countermeasure for that attack ?

Countermeasure
04:09

Install Notepad ++ in Kali Linux
04:36

How to bind a payload into a regular APK

Bind a Payload in a Regular APK
14:56
+
Social Engineering
5 Lectures 25:35

Email can be spoofed easily, you should not trust email blindly, in this section i will demonstrate how hacker can spoof email

Spoof Email
07:07

What is the countermeasure for that attack ?

Countermeasure
04:00

Caller ID can be spoofed easily, you should not trust email blindly, in this section i will demonstrate how hacker can spoof Caller ID

Spoofed Mobile Number
05:47

SMS can be spoofed easily, you should not trust email blindly, in this section i will demonstrate how hacker can spoof SMS

Spoofed SMS
04:49

What is the countermeasure for that attack ?

Countermeasure
03:52
+
Hacking using Android devices
5 Lectures 28:51

An excellent network sniffer tool 

Network Spoofer
10:34

How to Root and android devices. 

Root a device
05:08

A tool repository.

Bugtroid
05:18

Network sniffer tool.

DSPLOIT
02:50

What is the countermeasure for that attack ?

Countermeasure
05:01
+
Remote attacks on Android
2 Lectures 21:03
Port Forwarding
09:24

Hacking Remotely Demonstration

​Hacking Remotely Demonstration​
11:39
About the Instructor
Mohamed Atef
4.3 Average rating
2,197 Reviews
16,570 Students
12 Courses
Information Security Consultant, Certified Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.

CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience:
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt