What you'll learn:
- Transfom your Android Device into an Advance Ethical Hacking Machine
- Instagram Hacking like pro ATTACKER and make people people aware of such an attack
- Facebook Hacking like pro ATTACKER and make people people aware of such an attack
- Any Social Media Hacking as PRO Attacker and make people people aware of such an attack
- Metasploit Framework
- Learn how to Use Termux from Scratch
- PORT Forwarding
- Clone any Website
- What is Shell ?
- BASH Scripting
- What is F-Droid and its Importance
- Package Management
- Learn various CLI commands and use it like a Pro Penetration Tester
- LAN Attack
- WAN Attack
- Learn how to make Persistent Payload
- Cyber Security Terminology
- Metasploit Architecture
- Phishing Attack
- Run Kali Linux in your Android Device without Root
- Vulnerability , Exploit , Payload
- Bind Shell and Reverse Shell
- PHP Programming
- Ways to Prevent Cyber Attacks
- 3 Essential Tools of Encryption and Decryption
- Learn Encryption and Decryption
- How to access the Front Camera of the Victim
- Protect Your files with Passwords
- Installing PHP and Starting the Server
- Convert your Phishing Website into an Android App
- Wifi Password Cracking
- using of Hackers KeyBoard
- Social Engineering
- What is SALT in Cryptography ?
Course Update: Metasploit Issue Resolved!
Hello Everyone,
Welcome to the CAEHP, which stands for the Complete Android Ethical Hacking Practical Course.
I'm Debayan Dey, your instructor for this exciting course. CAEHP is all about hands-on practical learning in the world of Android Ethical Hacking!
This course is designed for anyone interested in understanding how attackers operate and extract information from their victims. What makes CAEHP unique is that you don't need a laptop or computer for this journey. All you need is an Android device because this course is 100% practical!
Isn't that amazing?
Plus, you don't even need to root your Android device. Yes, you read that right! All you need is your Android phone, and you can transform it into a powerful ethical hacking machine.
A little about me: I hold certifications like Certified Secure Computer User (CSCU) v2, Certified Ethical Hacker (CEH V10) from EC COUNCIL, and Google IT support certification from Google. Currently, I'm pursuing a micromaster in Cyber Security from the Rochester Institute of Technology (RIT) in New York through edx. I've also completed courses from prestigious institutions like New York University and The State University of New York.
Now, let's dive into what you can expect from the CAEHP COURSE.
Firstly, this course doesn't have a time limit. As you progress, you'll find that new sections and videos are added regularly. This ensures you stay up-to-date with the latest features, attacks, and how to protect yourself.
Currently, CAEHP has 6 Sections, 1 Optional Section, and 1 Bonus Section:
SECTION 1: Meet and Greet
Introduction to the Section
What is Termux?
What is Shell?
Why Termux?
Installation
What is F-Droid?
Package Management
Q/A Session with the instructor and Social Media contacts
SECTION 2: Termux Basics
Installing TERMUX from Google Play Store
Storage Setup, Update, and Upgrade
Why we use apt
Hidden files, versions
Various Text Editors
Learning how to check IP
Various other Network-Related Commands
Learning how to use GIT Repository
And much more!
SECTION 3: Metasploit Framework
Payload creation
LAN and WAN attacks
Port forwarding
Creating persistent Payload
BASH Scripting
Gaining control of a victim's mobile device
And much more!
SECTION 4: Encryption and Decryption
What is Encryption
What is Decryption
File encryption and decryption
Protecting files and folders with passwords
Installing important encryption tools in Linux
Understanding SALT in Cryptography
Performing Encryption and Decryption
And much more!
SECTION 5: Phishing Attack
Introduction
What is a Phishing Attack?
Mirroring websites
Cloning social media sites like Facebook, Instagram, and Twitter
Learning PHP
Running a cloned website on your LocalHost
Uploading the files online
Running the cloned website online
Social Engineering techniques
And much more!
SECTION 6: Camera Access and Uninstallation
Port forwarding
Generating HTTP or HTTPS URL links
Gaining camera access through a link
Receiving victim's photographs
Uninstalling dangerous packages
Staying safe and preventing hacking
Teaching family and friends how to stay protected
OPTIONAL SECTION: For Rooted Android Devices
Understanding Wi-Fi networks
Learning about AIRCRACK-NG
Installation of the package
Using AIRMON-NG
And much more for rooted devices!
BONUS SECTION: Running Kali Linux on Android
No need to root your Android device
Installing Kali Linux
Using SSH Client
Transforming your Android Device into a Penetration Testing and Ethical Hacking Device
Each section includes quizzes, assignments, and reading materials. We will regularly update the course with new content, ensuring you stay ahead of the latest attack techniques and defenses.
Please remember, this course is for educational and awareness purposes only. We demonstrate attacks so you can understand the technology and art behind them and protect yourself from social engineering. We do not condone or support any illegal activities.
Feel free to reach out anytime; I'm here to help. If you encounter any problems, post your doubts, and you'll receive a response within 24 to 48 hours.
Are you excited to embark on this 100% practical course, learn valuable skills, and help your family stay secure from data theft and hackers?
Best of luck, and I'll see you on the course landing page!