وب سایت تخصصی شرکت فرین
دسته بندی دوره ها
3

The Complete Mobile Ethical Hacking Course

سرفصل های دوره

Learn how hackers attack phones, mobile applications and mobile devices with latest technology and protect yourself!


1 - Introduction
  • 1 - Introduction and Welcome
  • 2 - Before We Start

  • 2 - Lab Setup
  • 3 - Introduction to Lab Setup
  • 4 - What is Virtual Machine
  • 5 - Installing Virtualbox for Windows Users
  • 6 - Installing Virtualbox for MAC Users
  • 7 - Kali Linux Download
  • 8 - Kali Linux Download Links.html
  • 9 - Kali Linux Installation
  • 10 - Problem Solving Windows
  • 11 - Solving Kali Installation Problems Iso Installation
  • 12 - Problem Solving MAC
  • 13 - Solutions to Common Problems and Links.html
  • 14 - Taking Snapshots
  • 15 - Kali Linux Overview
  • 16 - Navigation
  • 17 - Moving Stuff
  • 18 - Privilege and Permissions
  • 19 - Linux Folders
  • 20 - Package Managers
  • 21 - Nano
  • 22 - Changing Passwords

  • 3 - Mobile Backdoors
  • 23 - Mobile Backdoors Introduction
  • 24 - Backdoor Android vs iOS
  • 25 - What is Payload
  • 26 - IP Address
  • 27 - Tunnel Services
  • 28 - APK Process
  • 29 - Listening for Connections
  • 30 - Signing Process
  • 30 - signature.txt
  • 31 - Hacking Phone

  • 4 - Android Studio Fundamentals
  • 32 - Introduction to Android Studio Fundamentals
  • 33 - JDK Installation Windows
  • 34 - JDK Installation MAC
  • 35 - Android Studio Installation Windows
  • 36 - Android Studio Installation MAC
  • 37 - SDK Installation
  • 38 - Creating First Project
  • 39 - Android Studio Overview
  • 40 - User Interface
  • 41 - Connecting Views with Code
  • 42 - Changing Image
  • 43 - Opening Title Bar

  • 5 - Java Fundamentals
  • 44 - Introduction to Java Fundamentals
  • 45 - Java Basics
  • 46 - Variables
  • 47 - Data Types Continued
  • 48 - Variable or Constant
  • 49 - Arrays
  • 50 - Array List
  • 51 - Set
  • 52 - HashMap
  • 53 - Conditions
  • 54 - If Statements
  • 55 - Switch
  • 56 - For Loop
  • 57 - For Loop Continued
  • 58 - While Loop
  • 59 - Activity Lifecycle
  • 60 - Methods
  • 61 - Scope
  • 62 - Classes
  • 63 - Constructor
  • 64 - Access Levels
  • 65 - Getter and Setter
  • 66 - Java Fundamentals GitHub Codes.html
  • 67 - Calculator User Interface
  • 68 - Calculator Constraints
  • 69 - Connecting Views
  • 70 - Calculator Codes
  • 71 - Safe Calculator
  • 72 - Calculator GitHub Codes.html
  • 73 - Android Development in 10 Minutes

  • 6 - iOS Development Fundamentals
  • 74 - Introduction to iOS Development Fundamentals
  • 75 - Swift on Windows
  • 76 - MacBook Setup
  • 77 - Creating First Project
  • 78 - Xcode Overview
  • 79 - Simulator
  • 80 - User Interface
  • 81 - Connecting Views
  • 82 - Changing Image with Code
  • 83 - Downloading Projects
  • 84 - Options for Writing
  • 85 - Variables and Constants
  • 86 - Variable Types
  • 87 - Predefining Types
  • 88 - Arrays
  • 89 - Set
  • 90 - Dictionaries
  • 91 - While Loop
  • 92 - For Loop
  • 93 - If Controls
  • 94 - Functions
  • 95 - Optionals
  • 96 - Worst Calculator Assignment
  • 97 - Calculator Design
  • 98 - Calculator Codes
  • 99 - Safety and Scope
  • 100 - What is OOP
  • 101 - Initiliazer
  • 102 - What is Enum
  • 103 - What is Inheritance
  • 104 - Access Levels
  • 105 - GitHub Links.html

  • 7 - Rooting & JailBreaking
  • 106 - Introduction to Rooting & JailBreaking
  • 107 - What is Rooting & Jail Breaking
  • 108 - Jail Break Tools
  • 109 - Jail Break Process
  • 110 - iPad SSH
  • 111 - Android Installing APKs
  • 112 - Rooting Android

  • 8 - Reverse Engineering Android
  • 113 - Android Reverse Engineering Introduction
  • 114 - Reverse Engineering Tools
  • 115 - Kali Reverse Engineering Tools
  • 116 - MAC Reverse Engineering Tools
  • 117 - Hello World App
  • 118 - Creating APK
  • 119 - Dalvik Bytecode
  • 120 - App Manipulation
  • 120 - Dalvik Byte Code Cheat Sheet.txt
  • 121 - Signing
  • 121 - signature.txt
  • 122 - Jadx Usage
  • 123 - ProGuard Usage
  • 124 - Obfuscated APK Decryption
  • 125 - Game Hacking Practice
  • 125 - Word Game Link.txt
  • 126 - Word Game Codes
  • 127 - Reverse Engineering Advanced
  • 128 - Method Manipulation
  • 129 - Hacking the Game
  • 130 - GitHub Links.html

  • 9 - Reverse Engineering iOS
  • 131 - iOS Reverse Engineering Introduction
  • 132 - Jail Break Detection
  • 132 - Jail Break Detection.txt
  • 132 - Jail Break Detection Swift.txt
  • 133 - Assembly
  • 134 - Hexademical
  • 135 - Assembly Hints
  • 136 - Cycript
  • 136 - Cycript Tricks.txt
  • 137 - Manipulating App in Runtime
  • 138 - Swift Challanges
  • 139 - GitHub Links.html

  • 10 - Cloud Hacking Firebase Security
  • 140 - Cloud Security Introduction
  • 141 - Firebase Security Practice
  • 141 - Secure Tweet GitHub Link.txt
  • 142 - What is Firebase
  • 143 - Firebase Integration
  • 144 - Dependency Work
  • 145 - Preparing Files
  • 146 - XML Work
  • 147 - Java Files
  • 148 - Testing
  • 149 - How SecureTweet Works
  • 150 - Reverse Engineering
  • 151 - Getting Project ID
  • 152 - Getting Collection Name
  • 153 - Proxy Operations
  • 154 - Emulator Proxy
  • 155 - SSL Certificates
  • 156 - APK Manipulation
  • 157 - HTTPS Listening
  • 158 - Hacking Firestore
  • 159 - Safe Database Rules
  • 160 - Firestore Security Rules In Depth
  • 161 - GitHub Links.html

  • 11 - CTF Banking App Hacking
  • 162 - CTF Introduction
  • 163 - CTF GitHub Link.txt
  • 163 - CTF Practice
  • 164 - Installing Genymotion
  • 165 - Genymotion Settings
  • 166 - Server Setup Windows
  • 167 - Server Setup MAC
  • 168 - Running App
  • 169 - Bypassing Root Detection
  • 170 - Activity Manipulation
  • 171 - Simple Admin Flaw
  • 172 - Admin Vulnerability
  • 173 - Cryptology Hacking
  • 174 - Hacking Content Providers
  • 175 - GitHub Links.html

  • 12 - InNetwork Attacks for Mobile Devices
  • 176 - InNetwork Attacks Introduction
  • 177 - What is MITM
  • 178 - USB WiFi Card Options
  • 179 - Kali Linux WiFi Card List.html
  • 180 - Connecting USB WiFi Card
  • 181 - Solutions to Common Connection Problems.html
  • 182 - Bettercap Installation
  • 183 - ARP Attack
  • 184 - HTTPS Importance
  • 185 - Currency Converter GitHub Links.html

  • 13 - API Pentesting
  • 186 - What is API Security
  • 187 - DigitalOcean Free Credit Link.html
  • 188 - Creating Server
  • 189 - Installing API in Server
  • 190 - Burpsuite Settings
  • 191 - Postman
  • 192 - Broken Object Authorization
  • 193 - Broken Authentication
  • 194 - Excessive Data Exposure
  • 195 - One Time Password Bypass
  • 196 - Broken Function Level Authentication
  • 197 - Mass Assignment
  • 198 - Cors
  • 199 - SQLi
  • 199 - sqli.txt
  • 200 - Improper Asset Management
  • 201 - Closing

  • 14 - Closing
  • 202 - Further Tools & Reading Materials.html
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 15390
    حجم: 3513 مگابایت
    مدت زمان: 1606 دقیقه
    تاریخ انتشار: ۴ تیر ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید