Hacking and Pentesting Android Applications
- Offered byUDEMY
Hacking and Pentesting Android Applications at UDEMY Overview
Duration | 5 hours |
Total fee | ₹649 |
Mode of learning | Online |
Credential | Certificate |
Hacking and Pentesting Android Applications at UDEMY Highlights
- Earn a Certificate of completion from Udemy
- Learn from 2 article
- Get full lifetime access of the course material
- Comes with 30 days money back guarantee
Hacking and Pentesting Android Applications at UDEMY Course details
- For Penetration Testers
- For Mobile Application Developers
- For Security professionals who are interested in Mobile App Security
- For Anyone who is interested in ethical hacking and penetration testing
- For Anyone who is interested in information security concepts
- Learn the fundamentals of Android Application Penetration Testing
- Learn how to Reverse Engineer Android Apps
- Learn how to patch Android Apps using apktool to bypass SSL Pinning
- Learn how to bypass Jailbreak detection in Android Apps using objection
- Learn how to trace crypto calls made by an Android app using Frida
- Learn Android Application Penetration Testing using the modern day tools and techniques - Good Bye to old school tools
- This course is created with an idea of saying Bye Bye to outdated Android application penetration testing tools and techniques
- This course introduces students to the security concepts associated with Android Apps developed using Android Programming Language
- This course covers a variety of concepts such as Android Application structure, Reversing Android Apps, Bypassing client side restrictions such as root detection, SSL Pinning etc
- This course uses two vulnerable applications developed by the instructor to demonstrate how Android App vulnerabilities can be identified and exploited
- This course teaches you how to identify a variety of Android App vulnerabilities such as Insecure Data Storage, Insecure Logging, Weak Jailbreak detection, insecure end to end encryption, SQL Injection etc
- The best part of the course is that you will get a detailed understanding of how to trace an Android app's runtime and write a bunch of Frida scripts to pentest the target applications
Hacking and Pentesting Android Applications at UDEMY Curriculum
Introduction
Introduction
APK File structure
Exploring Android Apps on the device
Setting up Android pentesting lab
Introduction
Android lab setup pre-requisites
Challenges with Android lab setup
Vulnerable Apps & VM - Download
Lab setup using an Android emulator
Lab setup using a Non Rooted Android Phone
Android Application Penetration Testing - Basics
Introduction
Introduction to Android App Pentesting
Reversing Android Apps with APKTOOL
Reversing Android Apps with dex2jar and JD-GUI
Intercepting HTTP Traffic
Intercepting HTTPS Traffic
Insecure Data Storage vulnerabilities
Server Side Vulnerabilities
Introduction to client side vulnerabilities
Weak Crypto and Authorization Vulnerabilties
Exported Application Components
Insecure Logging
Client Side Injection
Clipboard - Copy Paste issues
Android Application Penetration Testing - Advanced
Introduction
Introduction to client side protections in Android Apps
Introduction to Frida
Root Detection Bypass using Objection
Insecure Local Data Storage - Revisited
Client side SQL Injection - Revisited
Traffic Analysis - Revisited
Introduction to Frida CLI
How Frida Scripts work?
Creating a JavaScript template for writing Frida Scripts
Enumerating loaded classes using Frida
Getting class properties using Frida
Bypassing Root Detection using Frida
Dumping string arguments using Frida
Tracing WebView calls using Frida
Introduction to end to end encryption
Dumping encryption keys using Frida
SQL Injection with encrypted Payloads
Introduction to SSL Pinning
Bypassing SSL Pinning using Frida
Fixing errors in SSL Pinning Bypass script
Reversing and Patching Android Apps to bypass SSL Pinning
Conclusion
Conclusion