Recents in Beach

Ethical Hacking with Android

Masters in Ethical Hacking with Android



Requirements
  • You shoud know About how to use Android Phone.



Course content



Introduction


Introduction


Introduction to Termux


Installing Termux Application on Android Phone


Hacker Keyboard Installation


Top Commands 


Miscellaneous


Sending SMS 


Make Call 


Creating Storage 


Programming


C Programming 


c ++ Programming 


Python Programming 


Metasploit


Installation Metasploit Framework 


Android Phone Hacking


Accessing the Files and Contacts of Android Phone 


Hacking Windows 


AUXILIRY MODULES METASPLOIT


Http enum_wayback auxiliary scanner


Endpoint_mapper - Scanner DCERPC Auxiliary Modules


Autopwn - auxiliary scanner


Email harvesting Using Metasploit


SSH version Scanner


FTP Version Scanning


Heartbleed Vulnerability(openssl scanner)


Nmap


Checking the status of target Machine


Checking the ports of target Machines


Miscellaneous Hackings

DDOS Attack


SQL mapping


Finding Location


Web Scanning


Phishing Attack


Brute Force Attack


Installation SEtoolkit