Home / Course catalog / Android Hacking and Penetration Testing Course

Hacking

Android Hacking and Penetration Testing Course


Description

-This course is highly practical that covers lots of tools and the hands-on demos of vulnerability exploitation, real world and Fuzz Testing.

Android is the biggest organized base of any mobile platform and developing fast—every day. Besides, Android is rising as the most extended operating system in this viewpoint because of different reasons.

This course covers Top 10 Security issues, all types of vulnerability, Reports on miscellaneous vulnerabilities, Installing Terminal, Application security, Unzip, Lots of software in Kali Linux OS and all types of practicals like Android application Tear down, Application signing, Android startup Process.

The course starts with information Gathering which is the most basic stride of an application security test. The security test should attempt to test however much of the code base as could reasonably be possible.

You will learn about how to intercept the traffic with Certificate pinning to avoid reverse engineering, it allows developers to specify which certificate the application allowed to trust. Instead of relying on certificate store.

Continue To Order: https://ethicalhackersacademy.com/collec...

Content
  • Promo
  • Introduction
  • Introduction
  • Pentesting White and Black box sample
  • Tools
  • Genymotion Setup
  • Installing Terminal
  • Burp Suite Installation
  • Setting up ADB
  • Genymotion Proxy
  • Certificate
  • Application Security
  • Unzip
  • Apktool
  • Dex2jar
  • File Parmission Present in Android
  • Android Database
  • Practical
  • Android Appilication Teardown
  • Application Signing
  • Top 10 Security issues
  • Top 10 Vulnerability Exploitation
  • Lesser known Android Attacks
  • Finding Vulnerabilities with Fuzz Testing
  • Android Startup Process
  • Digging Deeper
  • Android Traffic Interception
  • Analysis
  • Passive Analysis 1
  • Passive Analysis 2
  • Active Analysis
  • Vulnerability
  • File System Partition
  • AF-logical
  • Logcat
  • Information Leakage via Logcat Report
  • Fetching Data
  • SQlite
  • Insecure Data Storage
  • Possible to Steal any Protected files on Android Report
  • Account Hijacking Possible through ADB backup Feature Report
  • Webview Vulnerablity Report
  • Cross-Application Scripting in Android
  • Vulnerable to JavaScript Injection Report
  • HTML or XSS rendered in Android App
  • File Permission
  • Client-side Attack Surface
  • Client-side Attack Surface 2
  • Local Attack Surfaces
  • Physical Attack Surfaces
  • Attacking the Radio Interface Layer
  • Debugging and Analyzing Vulnerabilities
  • Expoit Mitigations
  • Miscellaneous Reports
  • Authentication Failed Mobile Version Report
  • Manifest allows for ADB backup attack when USB debugging is enabled report
  • Shopify Android Client all API Request's Response Leakage Report
  • Multiple Critical Vulnerabilities in Odnoklassniki Android Application Report
  • Email Leak in Transactions in Android App Report
  • Android Address Bar Spoofing Vulnerability Report
  • Bypass Pin
  • Coinbase Android Application - Bitcoin Wallet Leaks OAuth Response Code report
  • Content Provider Information Leakage report
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: Forever