Android Penetration Testing 101
What you'll learn
- Enrollers are guided from the basic understanding of android architecture to Performing vulnerability assessment on android applications.
- After completion of the course, you'll be ready to perform vulnerability assessments on any android application.
- Having basic android knowledge would be more gain. However, we will be sharing the required knowledge in the course for the benefit of beginners.
- Android Penetration testers are very handful, you will be one among them at the end of the course.
Requirements
- Mainly Urge to learn something new
- Computer with 8gb ram with 100gb space would be more sufficient.
- Basic Android development knowledge would be more beneficial.
Description
The Android Penetration Testing 101 course is designed for beginners who are interested in exploring Android security but don't know where to start. This comprehensive course covers everything from understanding the Android architecture to analyzing Android applications using various attack vectors.
Throughout the course, you will learn how to perform static analysis on Android applications, including those developed with frameworks like React Native, Java, Flutter, and Cordova. You'll be introduced to essential tools such as Jadx, Jeb decompiler, and GDA decompiler, which aid in the static analysis process. Additionally, the course covers the installation and usage of automated scanners like MOBSF, enabling you to perform dynamic analysis on apps and identify common vulnerabilities. The course also highlights the key endpoints to focus on during static analysis.
One of the most exciting aspects of penetration testing is dynamic analysis. In this course, you'll understand why dynamic analysis is crucial for mobile applications and its role in vulnerability hunting. The course provides a step-by-step guide for setting up a dynamic analysis lab, featuring the use of Burp Suite with Genymotion. SSL pinning is a fundamental concept covered extensively in the dynamic analysis section. The course explores SSL pinning in detail and demonstrates various methods to bypass it on Android.
To enhance your dynamic analysis skills, the course introduces powerful tools like Frida and objection, and provides instructions on their setup and usage. The course concludes with a live dynamic analysis session on an Android application, during which you'll learn how to identify common vulnerabilities, locate relevant endpoints, and extract sensitive information from the app's database.
As a bonus, the course includes an Android pentesting checklist, which serves as a handy reference guide during real-time analysis, ensuring a smoother pentesting experience.
Who this course is for:
- Android developers develop secured applications and perform security analysis on their applications.
Instructor
Byte Theories is a group of Security Experts and malware analysts, who instruct and help organizations to improve their Infrastructure Security and their application security. We do organize security awareness programs with colleges, schools, and other important public departments to share insights on what does and doesn't in the internet world.
We follow the slogan " Spread the Knowledge for Good", so we help all the security aspirants to gain more knowledge in their domains.