Building A Malicious Program Using Java (Ethical Hacking)
$19.99 Track price
in this course we will build an advanced malicious program using java language, we will begin from theoretical part until we reach into expremental part.
we will try to hide a malicious code into legal program.
this legal program has this features :
beautiful design with graphical user interface.
solve second degree equation.
do all the operation(addition, subtraction , division and multiplication element by element) between two matrix.
executed in any operation system platform .
contains a malicious code without any suspect things.
store data target into database without any suspect from target.
interacts with the command shell
the data that was collected from the legal program ( mathematica ) are :
public ip and local ip target.
Host Mac Ethernet board.
All interfaces network.
All connected ip addresses from the target.
operating system info.
All list process.
Name of root user.
the mathematica program just for target side , we will also build another program (spy) for hacker side , which provide the attacker all news and data targets.
through this program the hacker can do :
get a report about data targets.
see the screenshot of targets.
save data target into text file.
we will build all this things step by step , so subscribe for this course and i will do my best to satisfy you .
Courses : 1
Specification: Building A Malicious Program Using Java (Ethical Hacking)
5 reviews for Building A Malicious Program Using Java (Ethical Hacking)
Add a review Cancel reply
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Avinash Upadhyaya –
An average course with no explanations for the main part of the course i.e. creating the malicious code.
Houssam kaiba –
Edmond Dondon –
I love it
Mohd Juned –
This is an outstanding course. Very good way of teaching.
Thurairatnam Sivasaththivel –
Excellent course for intermediate people, prompt response by lecturer which is awesome….please do some more courses maybe Viruses and Trojan horse?