Android Hacking And Penetration Testing

Learn Android Hacking and Penetration Testing from the absolute basics
3.2 (36 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,872 students enrolled
Instructed by Js Infosec Development / Mobile Apps
$19
$90
79% off
Take This Course
  • Lectures 62
  • Length 8 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 5/2014 English

Course Description

Android Hacking and Penetration Testing course is a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, You will learn various topics such as Android architecture, Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android malware etc. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications

Course Instructors :-

Srinivas

Srinivas is one of the Founders of JSinfosec. He is a Cyber Security Enthusiast, writer and a Speaker. He is one the coauthors of the book "Hacking S3rets", He is an active member of Null Hyderabad. His area of Interests Include Web Application Pentesting, Android application Fuzzing and Pentesting.

John
John is one of the founders of JSinfosec. He is an Infosec researcher, Freelance Pen tester and a blogger. He has more than 5 Years of experience in the field of Information Security. His area of Interests Include Wireless Security and Penetration Testing, Android Security & Forensics

What are the requirements?

  • PC
  • Android Device (Optional)
  • Wireless Router (optional )

What am I going to get from this course?

  • By the end of the course , You will learn How to Fuzz applications
  • By the end of the course, students will be able to understand the internals of android and it's security
  • They will be able to pentest android apps in an efficient way
  • By the end of the course, you will learn how to carryout man in the middle attacks in real world
  • They will be in a position to perform real world attacks on Android Devices and Apps
  • By the end of the course , You will undertsand the internals of Android App Reversing and Malware Analysis

What is the target audience?

  • Students
  • Pen testers
  • Developers
  • Security enthusiasts

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
Introduction To The Course
Preview
03:41
About the Instructors
2 pages
Course Instructions
02:12
Need For Mobile Security And Owasp Top 10 Mobile Risks
10:08
Section 2: Lab Setup For The Course
Lab Setup
06:44
Installing Ubuntu On VMware
11:16
Setting Up An Android Pen-testing Environment on Ubuntu
Preview
16:01
Section 3: Getting Familiar With Android Developer Tools
Eclipse IDE
17:28
Android Debug Bridge
13:58
Section 4: Android Architecture And Security Model
A Brief Intro to Android
3 pages
Android booting process
3 pages
Android's Architecture
Preview
13:16
Android Data Structures and File Systems
11:32
Android Apps
10:32
Android Security Model
10:55
Android Permissions
10:26
Google Bouncer
03:42
Section 5: Interacting With an Android Device
Difference Between Android Emulator & Android Device
03:04
Interacting With Android device Via Usb
06:11
All About Rooting
07:56
SSH
07:16
VNC
04:46
Busy Box
05:01
Section 6: Android Network Analysis
Setting Up A Proxy for Android Emulator
08:24
Setting Up A Proxy for Android Device
06:12
Installing CA certificate
15:48
Real World MITM and SSL MITM Attacks Part-1
10:02
Real World MITM and SSL MITM Attacks Part -2
11:09
Data Manipulation
06:23
Section 7: Android Reversing and Malware Analysis
Apk files in a nutshell
12:56
Introduction to Reverse Engineering
03:54
Reversing to get Source Code of Android Apps
08:40
Reverse Engineering with APKTOOL
08:38
Introduction to Android Malwares
06:56
Dynamic Vs Static Analysis
02:49
Static analysis of Android Malwares
12:08
Dynamic analysis of Android Malwares
11:20
Introduction to Android Tamer
06:33
Dynamic Analysis with DroidBox
07:16
Section 8: Android Application Pen testing and Exploitation
Installing JSinfosec Vulnerable Apps
03:02
Introduction to Android App pentesting
02:03
Fuzzing Android Apps with Burp - Proxy
08:54
Fuzzing Android Apps with Burp - Intruder
09:19
Attacking Authentication
08:58
Content Provider Leakage
12:47
Client Side Injection
04:36
Insecure Data Storage - Shared Preferences
07:58
Insecure Data Storage - SQLite Databases
12:04
Unintended Data Leakage
06:23
Broken Cryptography
10:06
Automated Security Assessments with Drozer
10:56
Exploiting Android Devices Using Metasploit
09:18
Section 9: Android Device And Data Security
Android Device Protection
04:05
Bypassing Android Locks
12:35
Android Data Extraction
06:28
Section 10: Using Android as a Pen testing Platform
A Look Into Commonly Used Pen testing and Hacking Apps
3 pages
PWN Pad on Nexus 7
10:25
Kali Linux on Android
03:43
Section 11: Conclusion And Road Ahead
Mobile Pen-testing Check List
3 pages
Android Security Practices
04:56
Course Summary And Revision
04:57
Conclusion
01:13

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Js Infosec, Next-Gen Information Security Training

Jsinfosec - Cyber Security website which offers Info-sec training , Pen-testing/Hacking tips, Security News and more.....

We provide high quality training's on Information Security to both students and working professionals , Our instructors are well experienced and qualified in their fields ,Our instructors have published numerous articles , white papers in various international online magazines . Our Instructors have reported vulnerabilities in numerous big websites and helped their organizations to secure them . We provide live and online Info-sec training's at very cheap and affordable price . Our courses are comprehensive and highly hands-on. our aim is to make info sec learning an enjoyable experience

Learn More About Us

http://www.jsinfosec.com/p/about.html

https://twitter.com/JSInfosec

https://www.facebook.com/pages/Jsinfosec/592970804115108

Ready to start learning?
Take This Course