وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

The Complete Android Ethical Hacking Practical Course C|AEHP

سرفصل های دوره

100% Hands-On Real World Practical Approach on Android Ethical Hacking. Learn to Prevent FACEBOOK , INSTAGRAM hacking!


1 - Introduction
  • 1 - Disclaimer and Note.html
  • 1 - Self Test.html
  • 2 - 5 Mins Reading Material Before we Start.html
  • 3 - Introduction
  • 3 - What is Ethical Hacking.txt
  • 4 - What is Termux
  • 5 - What is Shell
  • 6 - Why Termux
  • 7 - Installation
  • 8 - what is FDroid
  • 9 - Package Management

  • 2 - Termux Basics
  • 10 - Installing TERMUX from Google Play Store
  • 11 - Storage Setup Update and Upgrade Command
  • 12 - Why we use apt
  • 13 - apt Command in Linux.html
  • 14 - Remove Package
  • 15 - You can also download Hackers Keyboard from Google Play Store.html
  • 16 - Package Management Basics apt yum dnf pkg.html
  • 17 - Optional Reading Material for Knowledge Package Management Systems.html
  • 18 - Optional Reading Material Update Package Lists.html
  • 19 - aptshow
  • 20 - hidden files versions and CD commands
  • 21 - Nano and Cat commands
  • 22 - PWD and touch command
  • 23 - mkdir command
  • 24 - use of cd command
  • 25 - use of mv command
  • 26 - use of rm command
  • 27 - mix use of cp mv and touch command
  • 28 - use of uname command
  • 29 - use of ifconfig command
  • 30 - know your IP address
  • 31 - use of Ping command
  • 32 - use of chmod command
  • 33 - use of cal and proc command
  • 34 - use of git clone and wget command
  • 35 - Various Other Useful Commands.html

  • 3 - Metasploit Framework
  • 2 - Advanced TermuxLinux Commands Learning in the form of Quiz for Knowledge.html
  • 36 - What is Penetration Testing
  • 37 - Optional Advanced Understanding of Penetration Testing and its Stages.html
  • 38 - What is Metasploit Framework and its History
  • 39 - Optional Reading Material for Metasploit Framework.html
  • 40 - Basic Terminologies Vulnerability
  • 41 - Basic Terminologies Exploit
  • 42 - Basic Terminologies Payload
  • 43 - basic architecture of Metasploit
  • 44 - Module in Architecture of Metasploit
  • 45 - What is Shell Bind Shell Reverse Shell
  • 46 - Initial Steps ways to Prevent these Attacks and Conclusion
  • 47 - READING Material What is Social Engineering.html
  • 48 - installation of CPUZ
  • 49 - Optional Reading Material for CPUZ.html
  • 50 - Metasploit Installation
  • 51 - Very Important Course Update Metasploit Issue Resolved.html
  • 52 - 100 Working Metasploit Framework.html
  • 53 - Optional Reading Material for Installing the Metasploit in Termux.html
  • 54 - alert for Database Server
  • 55 - Test the Metasploit Framework and learn what is MSFconsole
  • 56 - Help Command and Banner Command
  • 57 - Show Command no audio
  • 58 - Show Search Info Use commands
  • 59 - Metasploit exploit over the LAN explaination
  • 60 - Reading Material of what is LAN ie LOCAL AREA NETWORK.html
  • 61 - complete exploit over the LAN
  • 62 - Reading Material What is WAN ie WIDE AREA NETWORK.html
  • 63 - Port Forwarding Demonstration with Data is Turned on along with hotspot failed
  • 64 - Hotspot Failure turning OFF again and again
  • 65 - Getting confused with the LPORT while we are doing with WIFI
  • 66 - learning from our mistakes perfectly working this time with wifi no audio
  • 67 - Making our payload PERSISTENT

  • 4 - Protect your files with Encryption
  • 68 - What is encryption and decryption
  • 69 - Reading Material Difference between Encryption and Decryption.html
  • 70 - Tool1
  • 71 - OPTIONAL Reading Material The Rijndael Encryption Algorithm.html
  • 72 - Tool2
  • 73 - OPTIONAL Reading Material pkzip stream cipher algorithm.html
  • 74 - Tool3 and what is salt explained
  • 75 - Tool3 Continued decryption
  • 76 - OPTIONAL Reading Material AES Algorithm.html

  • 5 - Phishing Attack and how to Prevent Unknown Threats
  • 77 - Section Introduction
  • 78 - What is Phishing Attack
  • 79 - Mirroring Website
  • 80 - Installing PHP and starting the Server in localhost with port number
  • 81 - Generated the password in localhost
  • 82 - Uploading files in webhosting platform
  • 83 - Convert your website to an Android APP

  • 6 - How an attacker access your Front Camera
  • 84 - Know the Tool which attackers use to access the Camera
  • 85 - OPTIONAL READING Material.html
  • 86 - if SAYCHEESE is not cloning try this one.html
  • 87 - How to perform the attack
  • 88 - How to uninstall the Tool

  • 7 - Access Front Camera and Back Camera of your Victims Android Device 100 Working
  • 89 - 1 what is Tool Name and its Cloning from GitHub
  • 90 - 2 changing the TOOL to full executable mode
  • 91 - Attempt with Option 1 and its a Success
  • 92 - Attempt with Option 2 and its again a Success

  • 8 - Optional Section
  • 93 - Crack wifi password with rooted android device

  • 9 - Reward Section
  • 94 - Learn how to install Kali Linux in non rooted android device
  • 95 - Complete WebApplication Penetration Testing Practical CWAPT LIVE.html
  • 96 - Learn Augmented Reality 101 In Depth.html
  • 97 - Whats Next.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 33535
    حجم: 1331 مگابایت
    مدت زمان: 338 دقیقه
    تاریخ انتشار: 7 فروردین 1403
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید