
Android Hacking and Security
Learn About Vulnerabilities and Protection Methods
2h 5m16 lectures2 sections
What you'll learn
- Understand the work environment and tools
- Identify hacking tools like MSF5 and NGrok
- Learn to protect devices from vulnerabilities
- Know how to collect and analyze data
- Apply security strategies effectively
- Manage vulnerabilities and attacks successfully
About this course
This course focuses on the practical side of penetration testing without neglecting the underlying theory behind each attack. You will understand how each attack works, how it is practically executed, and the tools and software used by hackers to record calls and obtain passwords. This knowledge provides you with a complete understanding of the conditions that allow for the successful execution of such attacks. It helps you detect and sometimes prevent these attacks from occurring.
Expected outcomes
- Master the tools and software used for Android hacking.
- Ability to execute ethical hacking attacks and experiments.
- Protect Android devices from attacks and secure them professionally.
- Create a comprehensive working environment for device analysis and protection.
Course content
1Android Hacking and Protection
14 lectures
- Introduction to the Course5:24
- Installing the Work Environment and Benefits of Virtual Systems10:50
- Explaining Kali Linux and Important Commands in Hacking Devices10:21
- What is Payload and Explanation of Msvenom Tool10:10
- The Advantages of IP Address and How to Spy on Devices8:08
- Installing NGrok and Explaining Tunnel Service Concept10:10
- Spying Using Ports and Explaining LHOST + LPORT Concepts9:23
- Setting Up Metasploit and Listening on the Victim's Device11:41
- Hacking the Device and Accessing All Files Using MSF56:40
- What is Root for Android and Its Benefits in Hacking Phones7:21
- Firebase and Gathering Information from the Victim's Phone9:15
- Linking Firebase Information Using Android Studio9:34
- Explaining BetterCap Tool and Starting to Spy7:44
- Explaining ARP Attack Concept for Hacking Android Devices9:11
2Books
2 attachments
- Download the Comprehensive Guide to Hacking Android Devices
- Download the Comprehensive Guide to Protecting Android Devices
Instructor

Eng. Kanaan Al-Hallaj
6,905 students14 courses





