Home / Course catalog / Bug Bounty: Android Hacking


Bug Bounty: Android Hacking

In this course you will learn how to hack all kind of android application, you will not just learn to hack them, you will even learn how to earn from hacking them.

It's all 100% legal, Earning by hacking legally is known as bug bounty program, 250+ companies have a bug bounty program, Facebook paid 5 million to hackers, Google paid over $6 million and many others to pay. One earns millions to 100,000$/month, so basically, the bug bounty program is where hackers get paid for hacking and disclosing bugs to the parent company, if you want to earn by hacking means this course is for you, this course will help you to get started in the bug bounty program.

Topics Covered
Top 10 Security issues
all types of vulnerability
Reports on miscellaneous vulnerabilities,
Installing Terminal
Application security
Lots of software in Kali Linux OS Practicals like Android application Teardown
Application signing
Android startup Process

Course Duration
53 Lectures and 2:30 Hours
Full lifetime access
Access on mobile and TV
Certificate of Completion
80 students enrolled

Continue To Order: https://ethicalhackersacademy.com/produc...

  • Introduction
  • Disclaimer
  • Pentesting White and Black box sample
  • Tools
  • Genymotion Setup
  • Installing Terminal
  • Burp Suite Installation sample
  • Setting up ADB
  • Genymotion Proxy
  • Certificate
  • Application Security
  • Unzip
  • Apktool
  • Dex2jar
  • File Parmission Present in Android
  • Android Database
  • Practical
  • Android Appilication Teardown
  • Application Signing
  • Top 10 Security issues
  • Top 10 Vulnerability Exploitation
  • Lesser known Android Attacks
  • Finding Vulnerabilities with Fuzz Testing
  • Android Startup Process
  • Digging Deeper
  • Android Traffic Interception
  • Analysis
  • Passive Analysis 1
  • Passive Analysis 2
  • Active Analysis
  • Vulnerability
  • File System Partition
  • AF-logical
  • Logcat
  • Information Leakage via Logcat Report
  • Fetching Data
  • SQlite
  • Insecure Data Storage
  • Insecure Data Storage
  • Possible to Steal any Protected files on Android Report
  • Account Hijacking Possible through ADB backup Feature Report
  • Webview Vulnerablity Report
  • Cross-Application Scripting in Android
  • Vulnerable to JavaScript Injection Report
  • HTML or XSS rendered in Android App
  • File Permission
  • Client-side Attack Surface
  • Client-side Attack Surface 2
  • Local Attack Surfaces
  • Physical Attack Surfaces
  • Attacking the Radio Interface Layer
  • Debugging and Analyzing Vulnerabilities
  • Expoit Mitigations
  • Miscellaneous Reports
  • Authentication Failed Mobile Version Report
  • Manifest allows for ADB backup attack when USB debugging is enabled report
  • Shopify Android Client all API Request's Response Leakage Report
  • Multiple Critical Vulnerabilities in Odnoklassniki Android Application Report
  • Email Leak in Transactions in Android App Report
  • Android Address Bar Spoofing Vulnerability Report
  • Bypass Pin
  • Coinbase Android Application - Bitcoin Wallet Leaks OAuth Response Code report
  • Content Provider Information Leakage report
Completion rules
  • All units must be completed