Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Mobile Application market is growing like anything and so is the Mobile Security industry. With lots of frequent application releases and updates happening, conducting the complete security analysis of mobile applications becomes time consuming and cumbersome mainly because of the overheads in setting up and maintaining a mobile application testing environment. This course will introduce an extendable, and scalable web framework called Mobile Security Framework (MobSF) for Automated Security analysis of Mobile Applications. Mobile Security Framework is an intelligent and automated open source mobile application (Android/iOS) pentesting and binary/code analysis framework capable of performing static and dynamic analysis. It supports Android and iOS binaries as well as zipped source code. This course will teach the attendee on how to configure and run MobSF. In addition to that, the instructor will discuss various real world use cases with MobSF like Android Malware analysis and uncovering vulnerabilities in few Android applications that are present in Google playstore.
Features of this course
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction to Mobile Security Framework - MobSF|
Getting Mobile Security FrameworkPreview
What makes Mobile Security Framework UniquePreview
Basic Requirements to Run MobSFPreview
|Section 2: Performing Static Analysis with MobSF|
Overview: Static AnalysisPreview
Configuring MobSF for Static AnalysisPreview
Static Analysis in Android Binaries and Source Code
Performing Static Analysis on Android Binaries
Performing Static Analysis on Android Source Code
Static Analysis in iOS Binaries and Source Code
Performing Static Analysis on iOS Binaries
Performing Static Analysis on iOS Source Code
|Section 3: Performing Dynamic Analysis with MobSF|
Overview: Dynamic Analyzer
Dynamic Analysis in Android Binaries
Configuring MobSF for Dynamic Analysis of Android Binaries
Performing Dynamic Analysis of Android Binaries with MobSF
|Section 4: Case Studies|
Android Malware Analysis
AppLock MITM Password Reset Vulnerability
Exploiting AppLock Vulnerability
Bypassing Pin in Whisper Android Application
Exploiting Whisper App Vulnerability
|Section 5: Slides|
Ajin Abraham is an Application Security Engineer by profession having 5+ years of experience in Application Security including 2 years of Security Research. He is passionate on developing new and unique security tools than depending on pre existing tools that never work. Some of his contributions to Hacker's arsenal include OWASP Xenotix XSS Exploit Framework, Mobile Security Framework (MobSF), Xenotix xBOT, MalBoxie, Firefox Add-on Exploit Suite, Static DOM XSS Scanner, NodeJsScan etc to name a few.
He has been invited to speak at multiple security conferences including ClubHack, NULLCON, OWASP AppSec AsiaPac, BlackHat Europe, Hackmiami, Confidence, BlackHat US, BlackHat Asia, ToorCon, Ground Zero Summit, Hack In the Box and c0c0n.