Full Mobile Hacking Course
Last updated 1/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.66 GB | Duration: 3h 52m
Last updated 1/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.66 GB | Duration: 3h 52m
Learn all about mobile hacking in this course
What you'll learn
Mobile Hacking
Requirements
Basic computer knowledge
Description
Come and learn from the top ethical hacking and penetration testing instructor, Loi Liang Yang, who has millions of views across the world from his cybersecurity teachings. You will learn all about ethical mobile hacking on Android and iPhone in this course! Course is strictly for ethical hacking and educational purposes!Reverse engineering applicationsAndroid debug bridgeControlling mobile devices remotelyCreating payloads to control mobile devicesAnd many more!
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Run Android on Windows
Lecture 2 Run Android on Windows
Lecture 3 Run Android Apps on Windows
Section 3: Install Kali Linux on Android Phone
Lecture 4 Install Kali Linux on Android Phone with NetHunter
Section 4: Run iPhone on MAC
Lecture 5 iPhone Simulator
Section 5: Hack Android with Metasploit
Lecture 6 Kali Linux Explained
Lecture 7 Metasploit Framework
Lecture 8 Geolocation of Device
Lecture 9 Access SMS of Device
Lecture 10 Hide Mobile App
Lecture 11 Embed Meterpreter Into APK
Section 6: L3MON Framework
Lecture 12 L3MON Framework
Lecture 13 L3MON for Storage Access
Section 7: Android Debug Bridge
Lecture 14 Android Debug Bridge
Lecture 15 Android Debug Bridge via Kali Linux
Lecture 16 Wireless Android Debug Bridge
Lecture 17 Reset Android Without Password
Section 8: SCRCPY Android Mirroring
Lecture 18 SCRCPY Android Mirroring
Section 9: OWASP GOAT
Lecture 19 Run Mobile App via ADB
Lecture 20 Mobile App File Access
Lecture 21 Reverse Engineering Mobile Apps
Lecture 22 Reverse Engineering Mobile Apps Data Storage Access
Lecture 23 Hack Usernames And Passwords Of Mobile Apps
Section 10: Ghost Framework
Lecture 24 Ghost Framework
Section 11: Android Hack via Browser Attacks
Lecture 25 Browser Share Location
Lecture 26 NGROK Hacking Without Port Forwarding
Section 12: Remotely Manage Computer from Android
Lecture 27 Remotely Manage Computer from Android
Section 13: Android Defense
Lecture 28 Check Phone For Indicators Of Compromise
Anyone keen to learn about hacking mobile devices