O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learn Hacking Using Android From Scratch

Video Description

Learn how to use Android as an ethical hacking tool

About This Video

  • Prepare your computer by installing NetHunter (an Android penetration testing platform) on your Android device.
  • Learn how to use the main menus of NetHunter, and how to install Kali Linux (a penetration testing OS) on your computer, and much more.

In Detail

Welcome to this comprehensive course on using Android as a penetration testing tool. You will start as a beginner with no previous knowledge about penetration testing. The course will start with you from scratch, from preparing your Android device and computer, installing the needed apps, and will finish up with examples of real-life scenarios that will give you full control over various computer systems. This course focuses on the practical side of penetration testing without neglecting the theory behind each attack. For each attack you will learn how that attack works and then you will learn how to practically launch that attack. This will give you a full understanding of the conditions which allow this attack to be successfully executed, and will help you to detect (and sometimes prevent) this attack from happening. The attacks explained in this course are launched against real devices.

Table of Contents

  1. Chapter 1 : Introduction
    1. Course Intro & Overview 00:02:57
  2. Chapter 2 : Weaponizing
    1. Preparing Your Android Device 00:02:09
    2. NetHunter Preview and Lab Overview 00:05:37
  3. Chapter 3 : Installing Kali Linux As Virtual Machine (Optional)
    1. Installing Kali 2017 As a Virtual Machine 00:08:31
    2. Basic Overview of the Operating System 00:07:06
  4. Chapter 4 : Information Gathering
    1. Discovering Wireless Networks – Wardriving 00:07:46
    2. Preparing Your Device To Crack WiFi Keys/Passwords - WEP/WPA/WPA2 00:07:38
    3. Network Mapping - Discovering Devices Connected To the Network 00:05:23
    4. Network Mapping - Discovering Open Ports 00:10:02
    5. Network Mapping - Discovering Installed Services 00:05:36
  5. Chapter 5 : Spying
    1. Introduction 00:03:10
    2. MITM (Man In The Middle) Methods 00:03:48
  6. Chapter 6 : Spying > MITM Method 1 - Bad USB Attack
    1. What Is the Bad USB Attack & How to Launch It 00:07:39
    2. Sniffing Data & Capturing Passwords 00:07:20
    3. Bypassing HTTPS 00:07:35
    4. DNS Spoofing 00:06:51
  7. Chapter 7 : Spying > MITM Method 2 - ARP Poisoning
    1. What Is ARP Poisoning 00:06:44
    2. ARP Poisoning & Sniffing Data Using arpspoof 00:07:02
    3. ARP Poisoning & Sniffing Data Using Zanti2 00:07:42
    4. Intercepting Downloaded Files 00:04:17
    5. Replacing Images & Injecting Javascript Code 00:02:37
  8. Chapter 8 : Spying > MITM Method 3 - Fake Access Point (Honey
    1. Fake Access Point Theory 00:05:59
    2. Configuring Access Point Settings 00:05:37
    3. Launching the Fake Access Point 00:08:46
    4. Sniffing Data Sent Over the Access Point 00:06:12
  9. Chapter 9 : Detection & Protection
    1. Detecting ARP Poisoning Attacks 00:05:02
    2. Detecting Suspicious Activity in the Network & Solutions to ARP Poisoning 00:04:43
  10. Chapter 10 : Exploitation (Gaining Access)
    1. Introduction 00:02:39
    2. Bypassing Windows/OSX Logins – Setup 00:05:36
    3. Bypassing Windows/OSX Logins 00:04:35
    4. Creating an Undetectable Backdoor 00:07:26
    5. Using Metasploit Meterpreter 00:09:16
    6. Replacing Downloads With a Backdoor 00:05:52
    7. Backdooring Downloads On the Fly 00:12:49
    8. HID Keyboard Attack- Executing Windows Commands on Target Computer via USB 00:07:04
    9. HID Keyboard Attack - Gaining Full Control over Windows Machine 00:09:08
  11. Chapter 11 : Exploitation - Rubber Ducky Scripts
    1. What Are Rubber Ducky Scripts & How to Use Them 00:04:01
    2. Automatic Download & Execute To Gain Full Control Over Windows 00:06:23
    3. Reverse OSX Shell to Gain Full Control over Mac OSX Computers 00:06:32
    4. Reverse Linux Shell to Gain Full Control over Linux Computers 00:03:41
  12. Chapter 12 : Detecting Malicious Files
    1. Protecting Yourself against Backdoor Delivery Methods 00:03:51
    2. Detecting Undetectable Backdoors 00:03:01