Write an Android Trojan from scratch
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 568 MB
Genre: eLearning Video | Duration: 18 lectures (1 hour, 2 mins) | Language: English
Learn to write a Reverse Connection trojan for Android - step by step
What you'll learn
Learn how to write your own reverse connection trojan in two different ways
Learn how automated tools generate reverse shell payloads
Learn Offensive Android Programming from scratch
Learn how to use existing tools such netcat within an Android app
Learn the fundamentals of Developing Android Apps
Learn how powerful Java native APIs are when writing offensive programs
Requirements
The course starts from basics, however it is good to have Java/Android programming knowledge
Description
This course introduces students to Offensive Java/Android Programming. Students will learn how to write an Android Application that gives a reverse shell from scratch. This course teaches you two different ways to write a reverse connection trojan for Android Platform - The first way is to write the trojan by packaging a netcat binary into an Android Application and the second way is by only using Java APIs. The code is tested against the latest versions of Android Operating System. You will learn interesting programming techniques. Having the ability to write your own payloads can also help you in bypassing anti virus softwares when needed. This is an intermediate to Advanced level course, but if you are a beginner with passion to learn Offensive Programming, you can still take this course. If you are a penetration tester or a security professional in general, this course is for you.
Who this course is for:
Penetration Testers
Android Developers
Security professionals who are interested in internals of security tools
Red Team members
Anyone who is interested in hacking and offensive programming
Download link:
Só visivel para registados e com resposta ao tópico.Only visible to registered and with a reply to the topic.Links are Interchangeable - No Password - Single Extraction