Помощь
Добавить в избранное
Музыка Dj Mixes Альбомы Видеоклипы Топ Радио Радиостанции Видео приколы Flash-игры
Музыка пользователей Моя музыка Личный кабинет Моя страница Поиск Пользователи Форум Форум
  #1  
Старый 01.04.2026, 12:14
jitexsubtra jitexsubtra вне форума
Старожил
 
Регистрация: 03.12.2025
Сообщений: 11,007
По умолчанию Hacking Mobile Devices


Hacking Mobile Devices
Last updated 4/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 3h 55m | Size: 2.33 GB
Beginners course of learning how to hack an Android and iOS Device with simple to understand methods
What you'll learn
Effectively use Metasploit to hack Android
Effectively use Phone Sploit to hack Android
Effectively use Seeker to find a mobile location and IP Logger
Effectively learn to scan a network for Mobile Devices and find network vulnerabilities to exploit
Effectively use BeeF XSS to exploit Mobile Browsers
Requirements
No Advanced Knowledge Required
A fast internet connection
Kali Linux
Some Java and Mobile Application Development Knowledge (Not Necessary)
Some HTML Knowledge (Not Necessary)
Description
This course will teach you the basics of hacking Android Devices which is for absolute beginners who are willing to learn hacking using advanced methods which have been simpler for the learner to understand. In this course you'll learn the following
- Social Engineering
- Android Device Malware Obfuscation
- Exploiting an Android device over a network
- Getting IP Address and Location Information of an Android Device
- Ethical Standards behind the use of hacking
- Networking Scanning and Port Scanning for Android Devices
- Using an exploit to effectively exfiltrate and gather information from a target Android Device
- Using BeeF XSS and other forms of exploits to gather information from an iOS and Android Device
The course will go through advanced understanding of hackers as well and what is dubbed as script-kiddies according to the Certified Ethical Hacker from EC-Council as well, which is different from the norm which may people don't understand about such hackers and a lot more information in comparison to the EC-Council Certified Ethical Hacker V. 12 as well including the use of PhoneSploit and other methods taught in the EC-Council Certified Ethical Hacker, which will be the main focus within the course.
This course strictly performs Ethical Hacking and contains many Offensive Security Methods for Red Teamers and Mobile Penetration Testers. Any unauthorized hacking performed by the knowledge taught in this course is strictly against the law and not recommended. Please follow the ethical standards and use this knowledge in your own devices. All devices used in this course are my own; I won't be responsible for any damage or illegal activity that you perform from the knowledge that is in this course, if you choose to do so, it will be upon your own discretion. This course is intended for educational purposes and a refresher for Penetration Testers who need to refresh their understanding in Mobile Hacking to help patch vulnerabilities and better the security of cyber infrastructure in the world of today.
Stay tuned to the course and be sure to complete the assessment to earn your certificate. Assessment will be short, so don't worry about that. Peace.
Who this course is for
Beginners who want to learn about mobile hacking
This course is strictly Ethical Hacking, Please don't use these techniques for illegal purposes.


Ответить с цитированием
Ответ


Опции темы

Ваши права в разделе
Вы не можете создавать темы
Вы не можете отвечать на сообщения
Вы не можете прикреплять файлы
Вы не можете редактировать сообщения

BB коды Вкл.
Смайлы Вкл.
[IMG] код Вкл.
HTML код Выкл.
Быстрый переход


Музыка Dj mixes Альбомы Видеоклипы Каталог файлов Радио Видео приколы Flash-игры
Все права защищены © 2007-2026 Bisound.com Rambler's Top100