Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Full Mobile Hacking Course

Posted By: ELK1nG
Full Mobile Hacking Course

Full Mobile Hacking Course
Last updated 1/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.66 GB | Duration: 3h 52m

Learn all about mobile hacking in this course

What you'll learn
Mobile Hacking
Requirements
Basic computer knowledge
Description
Come and learn from the top ethical hacking and penetration testing instructor, Loi Liang Yang, who has millions of views across the world from his cybersecurity teachings. You will learn all about ethical mobile hacking on Android and iPhone in this course! Course is strictly for ethical hacking and educational purposes!Reverse engineering applicationsAndroid debug bridgeControlling mobile devices remotelyCreating payloads to control mobile devicesAnd many more!

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Run Android on Windows

Lecture 2 Run Android on Windows

Lecture 3 Run Android Apps on Windows

Section 3: Install Kali Linux on Android Phone

Lecture 4 Install Kali Linux on Android Phone with NetHunter

Section 4: Run iPhone on MAC

Lecture 5 iPhone Simulator

Section 5: Hack Android with Metasploit

Lecture 6 Kali Linux Explained

Lecture 7 Metasploit Framework

Lecture 8 Geolocation of Device

Lecture 9 Access SMS of Device

Lecture 10 Hide Mobile App

Lecture 11 Embed Meterpreter Into APK

Section 6: L3MON Framework

Lecture 12 L3MON Framework

Lecture 13 L3MON for Storage Access

Section 7: Android Debug Bridge

Lecture 14 Android Debug Bridge

Lecture 15 Android Debug Bridge via Kali Linux

Lecture 16 Wireless Android Debug Bridge

Lecture 17 Reset Android Without Password

Section 8: SCRCPY Android Mirroring

Lecture 18 SCRCPY Android Mirroring

Section 9: OWASP GOAT

Lecture 19 Run Mobile App via ADB

Lecture 20 Mobile App File Access

Lecture 21 Reverse Engineering Mobile Apps

Lecture 22 Reverse Engineering Mobile Apps Data Storage Access

Lecture 23 Hack Usernames And Passwords Of Mobile Apps

Section 10: Ghost Framework

Lecture 24 Ghost Framework

Section 11: Android Hack via Browser Attacks

Lecture 25 Browser Share Location

Lecture 26 NGROK Hacking Without Port Forwarding

Section 12: Remotely Manage Computer from Android

Lecture 27 Remotely Manage Computer from Android

Section 13: Android Defense

Lecture 28 Check Phone For Indicators Of Compromise

Anyone keen to learn about hacking mobile devices