Master Termux - Hacking with Android
Beginner to Advance Practical Guide
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
$0.00 por los primeros 30 días
Escucha audiolibros, podcasts y Audible Originals con Audible Plus por un precio mensual bajo.
Escucha en cualquier momento y en cualquier lugar en tus dispositivos con la aplicación gratuita Audible.
Los suscriptores por primera vez de Audible Plus obtienen su primer mes gratis. Cancela la suscripción en cualquier momento.
Compra ahora por $8.99
-
Narrado por:
-
Virtual Voice
Este título utiliza narración de voz virtual
Voz Virtual es una narración generada por computadora para audiolibros..
This is the first edition book for Mastering termux with detailed information from scratch to advance level. It's recommended that you download/read the 2nd edition - http://www.amazon.com/dp/B0CGNXTSVG
By reading this book, you will be able to know/master- Get familiar with Linus Commands and terminal nature through termux
- Know how Linux distro works
- Scripting and editing through bash, python and shell
- Master termux terminal, able to do your own tutorials and memorize Installations from your heart
- Perform pentesting, information gathering, scanning, enumerating and hacking from your smartphone
- Monitor wifi network attacks like fake access point, WiFi Pineapple, Similar SSID, OPN Network Density
- Solve different CLI errors .....etc
The best thing about this book is its organized format and deep explanations. Every tool is placed into its category of function. For example, chapter 5 is for website tools with separate sub topics for pentesting, information gathering, DDOS attack tools and more. You can't imagine how much time I spent to categorize the tools and in fact it was the hardest part of writing this book. Now if you want website tools you can head to chapter 5 and if you want to hack wifi you can jump to chapter 8. Again, if you want tools for exploitation, Scanning Vulnerability & others you will simply get them well categorized within that chapter 5's sub topics.
SO INSIDE THIS BOOK:
In chapter one you will learn what is termux, how to use it, what is shell, what are packages, repositories, directories, frequently asked questions about termux, how to solve some errors....etc.
In chapter two you will be able to know Installations of different tools in termux, why we use different packages and what is their meaning, you will see basic commands you should know before starting hacking with termux, you will learn how to set up your keyboard usage, network commands and many more... .
Here it starts real hacking and using the termux tools in practical in chapter three. You will first learn how to attack victims using phishing tools and I have provided all phishing tools with newly created tools upto 2020. You will also learn about information gathering, vulnerability analyzing and exploitation tools.
In chapter four, under the title "Android as Hacker's Device" you will definitely learn real hacking with android using termux. This is the main chapter you will get ultimate hacking guides and find a way to use the biggest Linux tools in your android phone. These are like Kali linux, Metasploit Framework, Nmap, Hacktronian and so on. Chapter five will let you know how to hack website, do DDOS, pentest, gather information of target websites, trace ip adress, secure your website, host a website in a phone using termux..etc. Every piece of information is categorized to its category of function and the tools are easy to get them in place. I have included all termux tools that are developed for website.
In chapter six you will get many cool termux tricks and hacks. All tools given there are kind of tools that make termux interesting. You will enjoy discovering this chapter!
As you may have been wondering if social media hacking is included chapter seven is all about hacking and securing Facebook, Instagram, and WhatsApp accounts. You will learn how to be aware of your private data from falling to hacker's trap through different luring techniques, know how to hack, bruteforce, make wordlist and other stuffs that enable you access someone's social media
..read more
Todavía no hay opiniones