Uthena

Course description

This is extremely helpful for the individuals who need to begin hacking utilizing their Android Phone without Rooting the Device.

Have you always been interested in IT? Did you want to be a professional hacker for as long as you remember? If so, then you have come to the right place - in this course, you will learn all about ethical hacking and penetration testing. You’ll get the best of both worlds - you’ll be able to live out your dream of becoming a hacker while not doing anything illegal that could get you fined or - even worse - locked behind bars. But in order to learn how to hack, you must first know what is ethical hacking and penetration testing.

What is Penetration Testing?

If you’ve never heard about ethical hacking and all of the other terms associated with it, you might be quite confused. Here I am, talking about hacking people and not being punished for it like it’s the easiest concept in the world. As a matter of fact, however - it actually is! Ethical hacking and penetration testing have been the go-to terms of every network administrator for the longest time now. This type of hacking is legal because it is concerned about with advancing network security, rather than breaking it down and breaching it.

Any and all IT-based, network activity-oriented companies do require ethical hackers as employees to test out if the network is properly secured or not. This is where penetration testing comes in - the network is bombarded with various different attacks to see if it will break, and if it will, then which of the attacks will be the successful one. This type of a job is perfect for people who want to learn how to hack and are super interested in the topic, yet don’t want to get in trouble while practicing / actually doing it. This way, you are able to exercise your passion and even get paid for doing so.

What You’ll Learn??

You might be thinking - Why should I take this course to learn penetration testing? Why should I even bother there are so many free tutorials online! Although that is true as a statement, I offer you a very simple reason to motivate your choice in picking this course as your source of knowledge and information on network security maintenance - experience. The course is based on my own personal experience as a network security researcher. Having already spent some time in the industry, I was able to distinguish the varying trends and requirements for ethical hacking professionals. This course is centered around Android - you’ll learn Android penetration testing, how to create and test keyloggers, how to use Ubuntu and so on.

The only requirements for the course are for you to be familiar with Android (having used it before) and some very basic knowledge on how IT works, in general. Everything else will be provided within the course. Also, ready your passion for learning a new skill - if you’re a true IT enthusiast, you will surely appreciate ethical hacking (both from practical and philosophical standpoints) and all of the sub-topics that surround it. So, don’t hesitate - dive straight on in and I’ll see you on the other side!

NOTE: This course is created for educational purposes only and all the attacks are launched in my own lab or against devices that I have permission to test. 

 

Who this course is for:

  • People who want to learn ethical hacking.
  • People who want to learn how hackers hack into secure systems that do not have any vulnerabilities.

 

Requirements:

  • Some Experience Using Android
  • Basic IT skills

 

What you'll learn:

  • Install Ubuntu ROOT Terminal on your Android Device
  • Install other apps needed for penetration testing
  • These lectures are used to teach you how to use your Android Device(Without Root) to hack other computers and Android devices to test their Security level.
  • Gather important information about your target.
  • Email Spoofing -Send E-Mail Using Fake or Other Person's E-Mail.
  • Create a KEYLOGGER in android.
  • Create Your Own Phishing App(Application).
  • Stress Testing.
  • Create a fake login page and use it to stead passwords.
  • Capture keystrokes on a compromised system.
  • Secure yourself against the above discussed attacks.

Course curriculum

  • 2

    Termux basic Operations

  • 3

    Network Scanning

  • 4

    Denial of Service (DoS) attacks Demonstrated and explained

    • Things You will Learn

    • Performing DOS Attack with Termux

    • Performing DOS Attack without Termux

  • 5

    Exploitation

    • Things You will Learn

    • Introduction and Installing Metasploit Framework on Termux

    • Extract Email Address of Domain using Metasploit

    • Hack Windows Machine By Creating a Backdoor-Msfvenom Payload With Netcat

    • Hacking windows Machine with Metasploit

    • Hack Linux Systems by Generating a more Advanced Backdoor

    • Hacking an Android Device with MSFvenom

    • Capturing keystrokes with Metasploit

    • Meterpreter Basic Commands

    • Generate Payloads and Control Remote Machines

    • Continuing -Generate Payloads and Control Remote Machines

  • 6

    Social Engineering Attacks

  • 7

    Using The Above Attacks Outside The Local Network

    • Things You will Learn

      FREE PREVIEW
    • Hack Any Windows Machine Outside LAN

    • Remotely Hack Any Android Device with Metasploit- Hack Over WAN

    • Ngrok Installation,Configuration and Port Forwarding

    • Phishing Attack outside LAN Using Ngrok

    • Phishing Attack Over Wan without Termux

    • Creating Your Own Phishing App(Application)

  • 8

    How to Be Safe From Above Attacks

    • How to Detect Spoof Emails

    • How To Detect Trojans

    • How to Detect Phishing Page

Meet your instructor!

Muhammad Ali
Information Security Engineer


I’m a Network Engineer and security analyzer, & Hold a Master degree in Computer Network Engineering (CNE) with distinction and am currently working as a Researcher in IT security. 

My method of teaching is mostly by considering real life examples, I usually start the topic by explaining the theory behind every technique, then shows you how it actually works in a real life scenario.

My passion to the ethical hacking has mixed with the background in programming which makes me a wise Swiss knife professional in the computer science field.

Take this course today!

"Learn Network Attacks and Prevention's Through Android"