Description
This course includes customized VM with pre-installed tools which will save your time in installing multiple tools required for penetration testing of mobile applications.
– Start from Android architectures basics.
– Get a Customized VM with pre-installed tools
– Automated the Mobile Application Testing Process
– Covers Mobile applications reverse engineering.
-Practice on real world mobile applications.
– Build your own home lab on mobile application security.
– Provides you the skills necessary to perform Penetration tests of mobile applications.
– Automate the process of Mobile Testing
– Cover OWASP Top 10 vulnerabilities
Syallabus includes:-
Syllabus:
Introduction To Mobile Apps.
Mobile Application Security.
Mobile Application Penetration Testing.
The most common areas where we find mobile application data resides.
The Architecture of Android.
The App Sandbox and the Permission Model.
AndroidManifest.xml File.
Android Compilation Process.
Android Startup Process.
Android Application Components.
Setup a testing environment.
Android Debug Bridge (adb).
intercept and analyze the network traffic.
Reversing an Android application.
OWASP top 10 vulnerabilities for mobiles.
Install DIVA (Damn insecure and vulnerable App).
Insecure Logging Issue.
Insecure Data Storage.
Database Insecure Storage.
Insecure Data Storage Inside Temporary Files.
Hardcoding Issues.
Introduction To Mobile Apps.
Mobile Application Security.
Mobile Application Penetration Testing.
The most common areas where we find mobile application data resides.
The Architecture of Android.
The App Sandbox and the Permission Model.
AndroidManifest.xml File.
Android Compilation Process.
Android Startup Process.
Android Application Components.
Setup a testing environment.
Android Debug Bridge (adb).
intercept and analyze the network traffic.
Reversing an Android application.
OWASP top 10 vulnerabilities for mobiles.
Install DIVA (Damn insecure and vulnerable App).
Insecure Logging Issue.
Insecure Data Storage.
Database Insecure Storage.
Insecure Data Storage Inside Temporary Files.
Hardcoding Issues.
NOTE: This course is created for educational purposes only.
Who this course is for:
Penetration testers
Forensers
Mobile App Developers
IT personnel
Anyone who has a personal or professional interest in attacking mobile applications.
All who wants to start their carrier in android security.
Who this course is for:
Android Penetration Testing
Requirements
Learning Mindset
Last Updated 6/2020