Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    The Complete Mobile Ethical Hacking Course (updated 11/2022)

    Posted By: ELK1nG
    The Complete Mobile Ethical Hacking Course (updated 11/2022)

    The Complete Mobile Ethical Hacking Course
    Last updated 11/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 15.18 GB | Duration: 26h 48m

    Learn how hackers attack phones, mobile applications and mobile devices with latest technology and protect yourself!

    What you'll learn

    Mobile Cyber Security for Mobile Applications & Devices

    Mobile Applications and Games Penetration Tests

    Mobile Device Penetration Tests

    Android & iOS Fundamentals

    Java & Swift Fundamentals

    Ethical Hacking Fundamentals

    Reverse Engineering

    Mobile Application Development Fundamentals

    Requirements

    Computer with minimum 4GB RAM

    Description

    Welcome to Mobile Ethical Hacking From Scratch online training!We are going to start from scratch in this course and aim to learn all the details related to Ethical Hacking for Mobile Applications & Mobile Devices. Without any need of prior knowledge you will understand how hackers attack mobile applications & devices and protect yourself against these attacks. You will build your own hacking lab on your computer so that you can practice all the things that we are going to learn in this course.Every student who wants to build their own server for API Pentesting section will be given free 25$ - 100$ credits from Digital Ocean.This course is given by Atil Samancioglu who has more than 250.000 students on Udemy. Atil teaches Cyber Security & Mobile Application Development and he is also Mobile Application Development Instructor in one of the most prestigious universities in Europe. You can see some of the topics that we are going to cover through the course:Backdoor for Mobile DevicesReverse EngineeringGame HackingApp ManipulationNetwork MonitoringLinux FundamentalsFirebase Hacking & Firebase SecurityRoot & JailBreak OperationsDalvik BytecodeCycriptJadxApktoolCTF PracticesAndroid Mobile Application FundamentalsiOS Mobile Application FundamentalsJava FundamentalsSwift FundamentalsAPI PentestingContentThis course is ideal for students who are willing to learn mobile device and mobile application penetration testing and ethical hacking. Whether you are a professional developer or just a beginner it does not matter. We are going to start from scratch and aim to learn all the details. At the end of the course you will be able to understand the vulnerabilities in real world and learn how to fix them.Throughout the course we are not going to focus on pure theory. We are going to practice everything we learn with special apps and challenges specifically created for this course only! We are going to have real time hacking exercise. Important Notice: You should use all the information in this course in legal boundaries. Please refer to your local cyber security laws and make sure you are on the Ethical Hacking side. All students taking this course must commit to this rule.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction and Welcome

    Lecture 2 Before We Start

    Section 2: Lab Setup

    Lecture 3 Introduction to Lab Setup

    Lecture 4 What is Virtual Machine?

    Lecture 5 Installing Virtualbox for Windows Users

    Lecture 6 Installing Virtualbox for MAC Users

    Lecture 7 Kali Linux Download

    Lecture 8 Kali Linux Download Links

    Lecture 9 Kali Linux Installation

    Lecture 10 Problem Solving (Windows)

    Lecture 11 Solving Kali Installation Problems: Iso Installation

    Lecture 12 Problem Solving (MAC)

    Lecture 13 Solutions to Common Problems and Links

    Lecture 14 Taking Snapshots

    Lecture 15 Kali Linux Overview

    Lecture 16 Navigation

    Lecture 17 Moving Stuff

    Lecture 18 Privilege and Permissions

    Lecture 19 Linux Folders

    Lecture 20 Package Managers

    Lecture 21 Nano

    Lecture 22 Changing Passwords

    Section 3: Mobile Backdoors

    Lecture 23 Mobile Backdoors Introduction

    Lecture 24 Backdoor Android vs iOS

    Lecture 25 What is Payload

    Lecture 26 IP Address

    Lecture 27 Tunnel Services

    Lecture 28 APK Process

    Lecture 29 Listening for Connections

    Lecture 30 Signing Process

    Lecture 31 Hacking Phone

    Section 4: Android Studio Fundamentals

    Lecture 32 Introduction to Android Studio Fundamentals

    Lecture 33 JDK Installation (Windows)

    Lecture 34 JDK Installation (MAC)

    Lecture 35 Android Studio Installation (Windows)

    Lecture 36 Android Studio Installation (MAC)

    Lecture 37 SDK Installation

    Lecture 38 Creating First Project

    Lecture 39 Android Studio Overview

    Lecture 40 User Interface

    Lecture 41 Connecting Views with Code

    Lecture 42 Changing Image

    Lecture 43 Opening Title Bar

    Section 5: Java Fundamentals

    Lecture 44 Introduction to Java Fundamentals

    Lecture 45 Java Basics

    Lecture 46 Variables

    Lecture 47 Data Types Continued

    Lecture 48 Variable or Constant

    Lecture 49 Arrays

    Lecture 50 Array List

    Lecture 51 Set

    Lecture 52 HashMap

    Lecture 53 Conditions

    Lecture 54 If Statements

    Lecture 55 Switch

    Lecture 56 For Loop

    Lecture 57 For Loop Continued

    Lecture 58 While Loop

    Lecture 59 Activity Lifecycle

    Lecture 60 Methods

    Lecture 61 Scope

    Lecture 62 Classes

    Lecture 63 Constructor

    Lecture 64 Access Levels

    Lecture 65 Getter and Setter

    Lecture 66 Java Fundamentals GitHub Codes

    Lecture 67 Calculator User Interface

    Lecture 68 Calculator Constraints

    Lecture 69 Connecting Views

    Lecture 70 Calculator Codes

    Lecture 71 Safe Calculator

    Lecture 72 Calculator GitHub Codes

    Lecture 73 Android Development in 10 Minutes

    Section 6: iOS Development Fundamentals

    Lecture 74 Introduction to iOS Development Fundamentals

    Lecture 75 Swift on Windows

    Lecture 76 MacBook Setup

    Lecture 77 Creating First Project

    Lecture 78 Xcode Overview

    Lecture 79 Simulator

    Lecture 80 User Interface

    Lecture 81 Connecting Views

    Lecture 82 Changing Image with Code

    Lecture 83 Downloading Projects

    Lecture 84 Options for Writing

    Lecture 85 Variables and Constants

    Lecture 86 Variable Types

    Lecture 87 Predefining Types

    Lecture 88 Arrays

    Lecture 89 Set

    Lecture 90 Dictionaries

    Lecture 91 While Loop

    Lecture 92 For Loop

    Lecture 93 If Controls

    Lecture 94 Functions

    Lecture 95 Optionals

    Lecture 96 Worst Calculator Assignment

    Lecture 97 Calculator Design

    Lecture 98 Calculator Codes

    Lecture 99 Safety and Scope

    Lecture 100 What is OOP?

    Lecture 101 Initiliazer

    Lecture 102 What is Enum?

    Lecture 103 What is Inheritance?

    Lecture 104 Access Levels

    Lecture 105 GitHub Links

    Section 7: Rooting & JailBreaking

    Lecture 106 Introduction to Rooting & JailBreaking

    Lecture 107 What is Rooting & Jail Breaking?

    Lecture 108 Jail Break Tools

    Lecture 109 Jail Break Process

    Lecture 110 iPad SSH

    Lecture 111 Android: Installing APKs

    Lecture 112 Rooting Android

    Section 8: Reverse Engineering: Android

    Lecture 113 Android Reverse Engineering Introduction

    Lecture 114 Reverse Engineering Tools

    Lecture 115 Kali Reverse Engineering Tools

    Lecture 116 MAC Reverse Engineering Tools

    Lecture 117 Hello World App

    Lecture 118 Creating APK

    Lecture 119 Dalvik Bytecode

    Lecture 120 App Manipulation

    Lecture 121 Signing

    Lecture 122 Jadx Usage

    Lecture 123 ProGuard Usage

    Lecture 124 Obfuscated APK Decryption

    Lecture 125 Game Hacking Practice

    Lecture 126 Word Game Codes

    Lecture 127 Reverse Engineering Advanced

    Lecture 128 Method Manipulation

    Lecture 129 Hacking the Game

    Lecture 130 GitHub Links

    Section 9: Reverse Engineering: iOS

    Lecture 131 iOS Reverse Engineering Introduction

    Lecture 132 Jail Break Detection

    Lecture 133 Assembly

    Lecture 134 Hexademical

    Lecture 135 Assembly Hints

    Lecture 136 Cycript

    Lecture 137 Manipulating App in Runtime

    Lecture 138 Swift Challanges

    Lecture 139 GitHub Links

    Section 10: Cloud Hacking: Firebase Security

    Lecture 140 Cloud Security Introduction

    Lecture 141 Firebase Security Practice

    Lecture 142 What is Firebase?

    Lecture 143 Firebase Integration

    Lecture 144 Dependency Work

    Lecture 145 Preparing Files

    Lecture 146 XML Work

    Lecture 147 Java Files

    Lecture 148 Testing

    Lecture 149 How SecureTweet Works

    Lecture 150 Reverse Engineering

    Lecture 151 Getting Project ID

    Lecture 152 Getting Collection Name

    Lecture 153 Proxy Operations

    Lecture 154 Emulator Proxy

    Lecture 155 SSL Certificates

    Lecture 156 APK Manipulation

    Lecture 157 HTTPS Listening

    Lecture 158 Hacking Firestore

    Lecture 159 Safe Database Rules

    Lecture 160 Firestore Security Rules In Depth

    Lecture 161 GitHub Links

    Section 11: CTF: Banking App Hacking

    Lecture 162 CTF Introduction

    Lecture 163 CTF Practice

    Lecture 164 Installing Genymotion

    Lecture 165 Genymotion Settings

    Lecture 166 Server Setup (Windows)

    Lecture 167 Server Setup (MAC)

    Lecture 168 Running App

    Lecture 169 Bypassing Root Detection

    Lecture 170 Activity Manipulation

    Lecture 171 Simple Admin Flaw

    Lecture 172 Admin Vulnerability

    Lecture 173 Cryptology Hacking

    Lecture 174 Hacking Content Providers

    Lecture 175 GitHub Links

    Section 12: In-Network Attacks for Mobile Devices

    Lecture 176 In-Network Attacks Introduction

    Lecture 177 What is MITM?

    Lecture 178 USB Wi-Fi Card Options

    Lecture 179 Kali Linux Wi-Fi Card List

    Lecture 180 Connecting USB Wi-Fi Card

    Lecture 181 Solutions to Common Connection Problems

    Lecture 182 Bettercap Installation

    Lecture 183 ARP Attack

    Lecture 184 HTTPS Importance

    Lecture 185 Currency Converter GitHub Links

    Section 13: API Pentesting

    Lecture 186 What is API Security?

    Lecture 187 DigitalOcean Free Credit Link

    Lecture 188 Creating Server

    Lecture 189 Installing API in Server

    Lecture 190 Burpsuite Settings

    Lecture 191 Postman

    Lecture 192 Broken Object Authorization

    Lecture 193 Broken Authentication

    Lecture 194 Excessive Data Exposure

    Lecture 195 One Time Password Bypass

    Lecture 196 Broken Function Level Authentication

    Lecture 197 Mass Assignment

    Lecture 198 Cors

    Lecture 199 SQLi

    Lecture 200 Improper Asset Management

    Lecture 201 Closing

    Section 14: Closing

    Lecture 202 Further Tools & Reading Materials

    Students who want to learn about mobile ethical hacking,Students who want to learn about mobile application penetration testing,Mobile developers who want to learn about safe development,Cyber security specialists looking forward to expand their horizon into mobile world