UDEMY
UDEMY Logo

Hacking and Pentesting Android Applications 

  • Offered byUDEMY

Hacking and Pentesting Android Applications
 at 
UDEMY 
Overview

Learn how to pentest Android Applications using the modern day pentesting tools and techniques

Duration

5 hours

Total fee

649

Mode of learning

Online

Credential

Certificate

Hacking and Pentesting Android Applications
 at 
UDEMY 
Highlights

  • Earn a Certificate of completion from Udemy
  • Learn from 2 article
  • Get full lifetime access of the course material
  • Comes with 30 days money back guarantee
Read more
Details Icon

Hacking and Pentesting Android Applications
 at 
UDEMY 
Course details

Who should do this course?
  • For Penetration Testers
  • For Mobile Application Developers
  • For Security professionals who are interested in Mobile App Security
  • For Anyone who is interested in ethical hacking and penetration testing
  • For Anyone who is interested in information security concepts
What are the course deliverables?
  • Learn the fundamentals of Android Application Penetration Testing
  • Learn how to Reverse Engineer Android Apps
  • Learn how to patch Android Apps using apktool to bypass SSL Pinning
  • Learn how to bypass Jailbreak detection in Android Apps using objection
  • Learn how to trace crypto calls made by an Android app using Frida
  • Learn Android Application Penetration Testing using the modern day tools and techniques - Good Bye to old school tools
More about this course
  • This course is created with an idea of saying Bye Bye to outdated Android application penetration testing tools and techniques
  • This course introduces students to the security concepts associated with Android Apps developed using Android Programming Language
  • This course covers a variety of concepts such as Android Application structure, Reversing Android Apps, Bypassing client side restrictions such as root detection, SSL Pinning etc
  • This course uses two vulnerable applications developed by the instructor to demonstrate how Android App vulnerabilities can be identified and exploited
  • This course teaches you how to identify a variety of Android App vulnerabilities such as Insecure Data Storage, Insecure Logging, Weak Jailbreak detection, insecure end to end encryption, SQL Injection etc
  • The best part of the course is that you will get a detailed understanding of how to trace an Android app's runtime and write a bunch of Frida scripts to pentest the target applications
Read more

Hacking and Pentesting Android Applications
 at 
UDEMY 
Curriculum

Introduction

Introduction

APK File structure

Exploring Android Apps on the device

Setting up Android pentesting lab

Introduction

Android lab setup pre-requisites

Challenges with Android lab setup

Vulnerable Apps & VM - Download

Lab setup using an Android emulator

Lab setup using a Non Rooted Android Phone

Android Application Penetration Testing - Basics

Introduction

Introduction to Android App Pentesting

Reversing Android Apps with APKTOOL

Reversing Android Apps with dex2jar and JD-GUI

Intercepting HTTP Traffic

Intercepting HTTPS Traffic

Insecure Data Storage vulnerabilities

Server Side Vulnerabilities

Introduction to client side vulnerabilities

Weak Crypto and Authorization Vulnerabilties

Exported Application Components

Insecure Logging

Client Side Injection

Clipboard - Copy Paste issues

Android Application Penetration Testing - Advanced

Introduction

Introduction to client side protections in Android Apps

Introduction to Frida

Root Detection Bypass using Objection

Insecure Local Data Storage - Revisited

Client side SQL Injection - Revisited

Traffic Analysis - Revisited

Introduction to Frida CLI

How Frida Scripts work?

Creating a JavaScript template for writing Frida Scripts

Enumerating loaded classes using Frida

Getting class properties using Frida

Bypassing Root Detection using Frida

Dumping string arguments using Frida

Tracing WebView calls using Frida

Introduction to end to end encryption

Dumping encryption keys using Frida

SQL Injection with encrypted Payloads

Introduction to SSL Pinning

Bypassing SSL Pinning using Frida

Fixing errors in SSL Pinning Bypass script

Reversing and Patching Android Apps to bypass SSL Pinning

Conclusion

Conclusion

Faculty Icon

Hacking and Pentesting Android Applications
 at 
UDEMY 
Faculty details

Srinivas
Srinivas is an Infosec professional with interest in teaching information security concepts. He is an OSCP and OSCE. He has extensive experience in penetration testing web, network and mobile apps. The aim of these courses is giving the best quality infosec courses at an affordable price. All of these courses contain hands on labs and very detailed explanations.

Other courses offered by UDEMY

549
50 hours
– / –
3 K
10 hours
– / –
549
4 hours
– / –
599
10 hours
– / –
View Other 2351 CoursesRight Arrow Icon
qna

Hacking and Pentesting Android Applications
 at 
UDEMY 

Student Forum

chatAnything you would want to ask experts?
Write here...