Offensive Java

And

IOT Penetration Testing

profile card
Karthikeyan V
Mentor For Offensive Java And IOT Penetration Testing
India , Chennai
7
Courses
10
Writeups
85
Works
profile card
Jeyasri A
Co-Mentor For Offensive Java and IOT Penetration Testing
India , Coimbatore
1
Courses
2
Writeups
60
Works
Enroll Now!

Requirements:

  • Basic IT skills
  • Basic knowledge of Linux and/or Windows
  • Understand basic computer networking
  • Laptop or PC with minimum 2 - 4 GB Ram
  • Curiousity to learn about building a malicious program using Java
  • Basic knowledge about IOT
  • Basic knowledge about Networking

NOTE:

  • This course is created only for educational purposes and all the attacks are done in live not in labs and All the attacks shown in this course are properly disclosed with the required Permission

Who this course is for:

  • IOT Developers
  • Java Developers
  • IOT Pentesters
  • IT students and/or passionate
  • Anyone who want to learn the ethical hacking and penetration testing process
  • Cyber Security related students

What you will learn:

  • Networking
  • Java
  • Network Hacking
  • Web Attacks with Java
  • Proxy with Java
  • Malware Development
  • Backdoor development with Java
  • BackDoor Development
  • OS Hacking with Java
  • IoT hacking with Java
  • Hardware & Microcontroller development using Java

Course Details:

  • Duration : 50 days
  • Ordinary pricing : 5000 inr
  • Course language : Tamil
Enroll Now!

Course Curriculum

Chapter - 1 : Intro to Java and Setup

  1. 1. About Java
  2. 2. Java working process
  3. 3. Hands On With Java
  4. 4. IDE Setup

Chapter - 2 : Java Coding

  1. 1. Understanding the Java code 1
  2. 2. Understanding the Java code 2
  3. 3. Understanding the Java code 3
  4. 4. Understanding the Java code 4
  5. 5. Understanding the Java code 5
  6. 6. Understanding the Java code 6
  7. 7. Understanding the Java code 7
  8. 8. Understanding the Java code 8
  9. 9. Understanding the Java code 9
  10. 10. Understanding the Java code 10
  11. 11. Understanding the Java code 11
  12. 12. Understanding the Java code 12
  13. 13. Understanding the Java code 13
  14. 14. Understanding the Java code 14
  15. 15. Understanding the Java code 15

Chapter - 3 : Networking and Network Hacking

  1. 1. About Networking
  2. 2. Network Mapping using Java 1
  3. 3. Network Mapping using Java 2
  4. 4. Network Mapping using Java output

Chapter - 4 : WebServer and Web Hacking

  1. 1. About Webserver
  2. 2. WebConnection With Java
  3. 3. Live WebHacking using Java 1
  4. 4. Live WebHacking using Java 2
  5. 5. About Proxyl
  6. 6. Java with Burp Communication 1
  7. 7. About Burp
  8. 8. Java with Burp Communication 2

Chapter - 5 : System Hacking

  1. 1. Gaining shell with Java 1
  2. 2. Gaining shell with Java 2
  3. 3. Gaining shell with Java 3
  4. 4. Hacking Windows OS using Java
  5. 5. Hacking linux OS using Java

Chapter - 6 : Hardware Development

  1. 1. About Hardware development using Java
  2. 2. Hardware development 1
  3. 3. Hardware development 2
  4. 4. Hardware development 3
  5. 5. Hardware development 4
  6. 6. Understanding Hardware code 1
  7. 7. Understanding Hardware code 2

Chapter - 7 : IOT Hacking

  1. 1. About IOT Hacking
  2. 2. IOT Hacking with Java 1
  3. 3. IOT Hacking with Java 2
  4. 4. IOT Hacking with Java output
Enroll Now!

Course Content and trailer Videos