Building A Malicious Program Using Java (Ethical Hacking)

Build an Advanced malicious program (spy virus) for windows and linux platform using java [with arabic caption]

3.20 (45 reviews)
Udemy
platform
English
language
Development Tools
category
Building A Malicious Program Using Java (Ethical Hacking)
6,635
students
3 hours
content
Aug 2023
last update
$54.99
regular price

What you will learn

Discover the world of Ethical Hacking and Security With Java

Building a Graphical User Interfaces program using java

Building a Professional Spyware Program for target side

hiding a malicious code in legal application (mathematica program)

solving a second degree equation and operation between the matrix using java and GUI

Storing Collecting Data target into database with professional way.

Why take this course?

in this course we will build an advanced malicious program using java language, we will begin from theoretical part until we reach into expremental part.

we will try to hide a malicious code into legal program.

this legal program has this features :

  • beautiful design with graphical user interface.

  • solve second degree equation.

  • do all the operation(addition, subtraction , division and multiplication element by element) between two matrix.

  • executed in any operation system platform .

  • contains a malicious code without any suspect things.

  • store data target into database without any suspect from target.

  • interacts with the command shell

the data that was collected from the legal program ( mathematica ) are :

  1. public ip and local ip target.

  2. Host Mac Ethernet board.

  3. All interfaces network.

  4. All connected ip addresses from the target.

  5. operating system info.

  6. All list process.

  7. Name of root user.

  8. Screenshot target.

the mathematica program just for target side , we will also build another program (spy) for hacker side , which provide the attacker all news and data targets.

through this program the hacker can do :

  1. get a report about data targets.

  2. see the screenshot of targets.

  3. save data target into text file.

we will build all this things step by step , so subscribe for this course and i will do my best to satisfy you .

I request from you just to be patient and you have a willingness to learn.


Screenshots

Building A Malicious Program Using Java (Ethical Hacking) - Screenshot_01Building A Malicious Program Using Java (Ethical Hacking) - Screenshot_02Building A Malicious Program Using Java (Ethical Hacking) - Screenshot_03Building A Malicious Program Using Java (Ethical Hacking) - Screenshot_04

Reviews

Mário
August 15, 2021
This is for java students essentially. The tools used are common tools that can be find everywhere in the internet searching by words like " java how to get ip adress", or "java connect to mysql database".... Furthermore, for this works you must have always xampp working in a pc to copy the information for the db, obviously. I dindn't find any secure way to do this hacking, because you expose the ip of your db in the code, consequently if anyone analyze your code, easily will find the hacker behind of this... in resume, the title of this should be Java Programming to get information of users , not Ethical hacking....
Orpheo
February 10, 2021
Ik heb wat moeite met zijn engels. Er word wel gewezen hoe je het doel kan bereiken maar er is, tot nog toe, geen uitleg over waarom hij doet wat hij doet.
Thurairatnam
July 24, 2020
Excellent course for intermediate people, prompt response by lecturer which is awesome....please do some more courses maybe Viruses and Trojan horse?
Avinash
October 20, 2019
An average course with no explanations for the main part of the course i.e. creating the malicious code.

Charts

Price

Building A Malicious Program Using Java (Ethical Hacking) - Price chart

Rating

Building A Malicious Program Using Java (Ethical Hacking) - Ratings chart

Enrollment distribution

Building A Malicious Program Using Java (Ethical Hacking) - Distribution chart
2506422
udemy ID
8/13/2019
course created date
9/17/2019
course indexed date
Bot
course submited by