وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
2

The Complete Android Ethical Hacking Practical Course C|AEHP

سرفصل های دوره

100% Hands-On Real World Practical Approach on Android Ethical Hacking. Learn to Prevent FACEBOOK , INSTAGRAM hacking!


1 - Introduction
  • 1 - Disclaimer and Note.html
  • 1 - Self Test.html
  • 2 - 5 Mins Reading Material Before we Start.html
  • 3 - Introduction
  • 3 - What is Ethical Hacking.txt
  • 4 - What is Termux
  • 5 - What is Shell
  • 6 - Why Termux
  • 7 - Installation
  • 8 - what is FDroid
  • 9 - Package Management

  • 2 - Termux Basics
  • 10 - Installing TERMUX from Google Play Store
  • 11 - Storage Setup Update and Upgrade Command
  • 12 - Why we use apt
  • 13 - apt Command in Linux.html
  • 14 - Remove Package
  • 15 - You can also download Hackers Keyboard from Google Play Store.html
  • 16 - Package Management Basics apt yum dnf pkg.html
  • 17 - Optional Reading Material for Knowledge Package Management Systems.html
  • 18 - Optional Reading Material Update Package Lists.html
  • 19 - aptshow
  • 20 - hidden files versions and CD commands
  • 21 - Nano and Cat commands
  • 22 - PWD and touch command
  • 23 - mkdir command
  • 24 - use of cd command
  • 25 - use of mv command
  • 26 - use of rm command
  • 27 - mix use of cp mv and touch command
  • 28 - use of uname command
  • 29 - use of ifconfig command
  • 30 - know your IP address
  • 31 - use of Ping command
  • 32 - use of chmod command
  • 33 - use of cal and proc command
  • 34 - use of git clone and wget command
  • 35 - Various Other Useful Commands.html

  • 3 - Metasploit Framework
  • 2 - Advanced TermuxLinux Commands Learning in the form of Quiz for Knowledge.html
  • 36 - What is Penetration Testing
  • 37 - Optional Advanced Understanding of Penetration Testing and its Stages.html
  • 38 - What is Metasploit Framework and its History
  • 39 - Optional Reading Material for Metasploit Framework.html
  • 40 - Basic Terminologies Vulnerability
  • 41 - Basic Terminologies Exploit
  • 42 - Basic Terminologies Payload
  • 43 - basic architecture of Metasploit
  • 44 - Module in Architecture of Metasploit
  • 45 - What is Shell Bind Shell Reverse Shell
  • 46 - Initial Steps ways to Prevent these Attacks and Conclusion
  • 47 - READING Material What is Social Engineering.html
  • 48 - installation of CPUZ
  • 49 - Optional Reading Material for CPUZ.html
  • 50 - Metasploit Installation
  • 51 - Very Important Course Update Metasploit Issue Resolved.html
  • 52 - 100 Working Metasploit Framework.html
  • 53 - Optional Reading Material for Installing the Metasploit in Termux.html
  • 54 - alert for Database Server
  • 55 - Test the Metasploit Framework and learn what is MSFconsole
  • 56 - Help Command and Banner Command
  • 57 - Show Command no audio
  • 58 - Show Search Info Use commands
  • 59 - Metasploit exploit over the LAN explaination
  • 60 - Reading Material of what is LAN ie LOCAL AREA NETWORK.html
  • 61 - complete exploit over the LAN
  • 62 - Reading Material What is WAN ie WIDE AREA NETWORK.html
  • 63 - Port Forwarding Demonstration with Data is Turned on along with hotspot failed
  • 64 - Hotspot Failure turning OFF again and again
  • 65 - Getting confused with the LPORT while we are doing with WIFI
  • 66 - learning from our mistakes perfectly working this time with wifi no audio
  • 67 - Making our payload PERSISTENT

  • 4 - Protect your files with Encryption
  • 68 - What is encryption and decryption
  • 69 - Reading Material Difference between Encryption and Decryption.html
  • 70 - Tool1
  • 71 - OPTIONAL Reading Material The Rijndael Encryption Algorithm.html
  • 72 - Tool2
  • 73 - OPTIONAL Reading Material pkzip stream cipher algorithm.html
  • 74 - Tool3 and what is salt explained
  • 75 - Tool3 Continued decryption
  • 76 - OPTIONAL Reading Material AES Algorithm.html

  • 5 - Phishing Attack and how to Prevent Unknown Threats
  • 77 - Section Introduction
  • 78 - What is Phishing Attack
  • 79 - Mirroring Website
  • 80 - Installing PHP and starting the Server in localhost with port number
  • 81 - Generated the password in localhost
  • 82 - Uploading files in webhosting platform
  • 83 - Convert your website to an Android APP

  • 6 - How an attacker access your Front Camera
  • 84 - Know the Tool which attackers use to access the Camera
  • 85 - OPTIONAL READING Material.html
  • 86 - if SAYCHEESE is not cloning try this one.html
  • 87 - How to perform the attack
  • 88 - How to uninstall the Tool

  • 7 - Access Front Camera and Back Camera of your Victims Android Device 100 Working
  • 89 - 1 what is Tool Name and its Cloning from GitHub
  • 90 - 2 changing the TOOL to full executable mode
  • 91 - Attempt with Option 1 and its a Success
  • 92 - Attempt with Option 2 and its again a Success

  • 8 - Optional Section
  • 93 - Crack wifi password with rooted android device

  • 9 - Reward Section
  • 94 - Learn how to install Kali Linux in non rooted android device
  • 95 - Complete WebApplication Penetration Testing Practical CWAPT LIVE.html
  • 96 - Learn Augmented Reality 101 In Depth.html
  • 97 - Whats Next.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 33535
    حجم: 1331 مگابایت
    مدت زمان: 338 دقیقه
    تاریخ انتشار: ۷ فروردین ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید