Android Applications Hacking for Bug Bounty and Pentesting
What you'll learn
- Android Ethical Hacking
- Android Hacking
- Fundamentals of Android
- Android Lab & Device setup for Testing
- Basics of Android Pentesting
- Advanced Android Pentesting
- History of Android
- Android Ecosystem
- Application Sandboxing
- Android Components
- Analysis of APK file Structure
- Rooting Basics
- Root Detection Bypass
- SSL Pinning Bypass
- Android Static Analysis with MobSF
- Android Dynamic Analysis
- Real World Reports Walkthrough
- Android Bug Bounty
- Android Studio
- Android Hack
- Hack Android
- Hack Android Phone
- Hack Android Mobile
- Android
- Static Analysis with MobSF
- Android App Development
- Hacking
- Ethical Hacking And Penetration Testing
- Obfuscation Techniques
- Repackaging and Resigning an APK
- Reverse Engineering an APK file
- Creating an Android Virtual Device
- Analysis of APK file Structure in Android Studio
- Android Run time (ART)
- History of Android
- Android's Security Model
- Android Architecture
Requirements
- Basics of Web Application Security Knowledge
- Basics of Linux
- 10 GB or more disk space on system
- 4 GB (Gigabytes) of RAM or higher (8 GB recommended)
- Enable virtualization technology on BIOS settings, such as “Intel-VTx”
- Desire to learn Android Ethical Hacking
Description
Welcome to our course: Android Applications Hacking for Bug Bounty and Pentesting
This course is designed to help you kick-start the journey of android pentesting with right tools and methodology. Information security is the ever-changing field, we bring the latest methodology to setup your own environment and get your hands dirty with the android pentesting.
This course initiates with basics such as Android Architecture, what is Android Run time (ART), Android device Rooting Basics. Towards the intermediate concepts like Reversing Android Apps, Bypassing client side restrictions such as root detection, SSL Pinning etc. This course leverages multiple industry known & open source applications to demonstrate the test cases.
This course will also teaches you how to identify a variety of Android App vulnerabilities such as Insecure Data Storage, Insecure Logging, Weak Root detection, insecure end to end encryption, Access Control issues in REST API etc.
Essentially this course is designed to teach the general approach right from reversing the APK, to understand & identify vulnerabilities, modifying the application logic to run the modified application in the android environment. This course is for all levels. We will take you from beginner to advance level. You will learn step-by-step with hands-on demonstrations.
The highlights of this course are:
Fundamentals of android
Lab Setup in Windows & Linux
Static & Dynamic Analysis
Intercept Traffic using Burpsuite
Root detection bypass
SSL Pinning Bypass
Patching apps using objection
Frida code share & Startup scripts
Reversing & patching applications manually
Smali Understanding
Identifying client side encryption
Real world findings Walkthrough
See you inside the course!
Who this course is for:
- Beginner bug bounty hunter who wants to learn Android security
- Security enthusiasts who wants to learn about Android security
Instructors
I am a experienced Security Professional with a demonstrated history of working in the web, mobile, cloud and network security industry. I am Skilled in Vulnerability Assessment and Penetration testing. I have started my career in IT industry back in 2015, i have worked in backend programming as well.
I have led null Ahmedabad - (Largest open security community in india) for more than 4 years.I have been a Technical speaker at various community events and conferences.
Let's get on a journey to explore the infosec world together.
I'm Nishith, also known as Busk3r online where I share educational content for people interested in ethical hacking and bug bounty hunting and security in general.
I work as a full time penetration tester and do bug bounties in my free time. I have also presented in conferences and meetups and love to teach.