Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
In this course, we will discuss the vulnerabilities of the android application layer and we will demonstrate two Android applications, one for the disease and the other for the medication , The first one is a spyware application ”Disease” which resulted in a set of vulnerabilities in the Android operating system, and we will demonstrate how this can be built to abuse these vulnerabilities for intercepting victim cell phone Contacts, IMSI, Internet History, SMS, Call Logs and Location. The second one is the anti-spyware application ”medication” which implemented in order to mitigate the risks of such attacks and can view and clarify the whole applications that interested in the SMS, Incoming Calls, or Outgoing Calls and give the user the ability to know the unwanted applications like our spyware one. We will develop a step by step spy application which i called "Chameleon" and anti-spyware application which i called "DroidSmartFuzzer".
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: هذا الجزء خاص بمقتطفات محاضرتي في المؤتمر الدولي للأمن السيبراني|
My Paper On InfoSEC2015Preview
DroidSmartFuzzer Collaboration DiagramPreview
Practical Demo On InfoSEC 2015Preview
Answering Questions On InfoSEC2015Preview
|Section 2: The Architecture Of Spyware Application|
Introduction To Our CoursePreview
The Spyware Design & Architecture
Working With Google Cloud SQL
Using Razor SQL
Creating Victim's Cloud Database
|Section 3: Let's Spy On Our Phone|
Creating The DB Controller Class
Get Imsi and Phone Model
Single Tone Pattern For DB Controller
Convert Contacts Data To VCard
Send The VCard To Cloud DB
|Section 4: Internet History & Hiding Spyware|
Spy On Internet History
Hiding Spyware From Launcher
|Section 5: Spy On SMS|
Listening To Incoming SMS
Sending SMS to The Cloud DB
|Section 6: Spy On Phone Calls|
Introduction To Incoming and Outgoing Calls
Using The Call Controller Class
Spy On Incoming Calls
Long Operation Class
Spy On Outgoing Calls
Interception For Calls Location
|Section 7: Detect The Undetectable|
Understanding the Vulnerabilities
Why Detecting Commercial spywaresPreview
Collaboration Diagram for DroidSmartFuzzer
|Section 8: Developing DroidSmartFuzzer Step by Step|
Outgoing Call Injector
|Section 9: Cognalys Android SDK|
Introduction to Cognalys Server
Testing Cognalys Injection
|Section 10: Start The Detection Journey|
Fill The Dangerous Permissions List
Get Spy Permissions
Read All Installed Apps Permissions
Testing our Filter
DroidSmartFuzzer Full Demo
|Section 11: Preparation for Fuzz Injection|
Custom Fuzzing List Item
Custom Detailed Permissions List Item
Design Fuzzing Activity
Internet Usage Class
Fuzz Injectors List Adapter
Rest of Permissions Adapter
Fill The Injectors List + Source Code
Fill Rest Of Permissions List
Checking The Fuzzing Activity Implementation
Hi! I'm Mustafa. I have a degree in Computer Engineering from Ain-Shams University since 2003 also i have a master degree in Mobile Security since 2012.
After working as a software developer, team leader, IT development manager and trainer for over 11 years for a whole bunch of companies including ITS, ISI, TradeNet and OptimumSolution in Egypt , I decided to work part-time as a private software trainer. I have a very good experience in teaching mobile application development and testing also most of the popular programming languages like (C, C++, C#, Objective-C, Java SE, Lab Windows, Lab View).
I'm passionate about teaching a lot of Egyptian trainees to code, and help them to be a successful junior software developers at a well known companies in Egypt like Valeo, Orange, NTRA, Samsung Egypt, Nahdit Misr, TradeNet and Egyptian Armed Forces.