MASTER IN ETHICAL HACKING WITH ANDROID
With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device.
Topics Cover In This Course
Introduction:
- Introduction
- Introduction to Termux
- Installing Termux Application on Android Phone
- Hacker Keyboard Installation
- Top Commands
Miscellaneous:
- Sending SMS
- Make Call
- Creating Storage
Programming:
- C Programming
- Python Programming
Metasploit:
- Installation Metasploit Framework
- Android Phone Hacking
- Accessing the Files and Contacts of Android Phone
- Hacking Windows
Auxiliry Modules Metasploit:
- Http enum_wayback auxiliary scanner
- Endpoint_mapper - Scanner DCERPC Auxiliary Modules
- Autopwn - auxiliary scanner
- Email harvesting Using Metasploit
- SSH version Scanner
- FTP Version Scanning
- Heartbleed Vulnerability(openssl scanner)
Nmap:
- Checking the status of target Machine
- Checking the ports of target Machines
Miscellaneous Hackings:
- DDOS Attack
- SQL mapping
- Finding Location
- Web Scanning
- Phishing Attack
- Brute Force Attack
- Installation SEtoolkit
0 Comments