HOME > IT & Software > The Complete Guide to Android Bug Bounty Penetration Tests

The Complete Guide to Android Bug Bounty Penetration Tests

SynopsisThe Complete Guide to Android Bug Bounty Penetration Tests, a...
The Complete Guide to Android Bug Bounty Penetration Tests  No.1

The Complete Guide to Android Bug Bounty Penetration Tests, available at Free, has an average rating of 4.6, with 21 lectures, based on 71 reviews, and has 5539 subscribers.

You will learn about Setting up Android Studio and Emulators Basics of adb Decompiling and Recompiling apks Drozer Burp Suite Code Modification Exploits Finding code backdoors Activity Exploits Broadcast exploits Content provider injection Access control issues Scoring Vulnerabilities with CVSS This course is ideal for individuals who are Android developers looking to secure their applications or Hackers looking to learn common Android vulnerabilities or Bug Bounty participants looking to target Android apps or People looking to expand their knowledge of Computer Security It is particularly useful for Android developers looking to secure their applications or Hackers looking to learn common Android vulnerabilities or Bug Bounty participants looking to target Android apps or People looking to expand their knowledge of Computer Security.

Enroll now: The Complete Guide to Android Bug Bounty Penetration Tests

Summary

Title: The Complete Guide to Android Bug Bounty Penetration Tests

Price: Free

Average Rating: 4.6

Number of Lectures: 21

Number of Published Lectures: 21

Number of Curriculum Items: 21

Number of Published Curriculum Objects: 21

Original Price: Free

Quality Status: approved

Status: Live

What You Will Learn

  • Setting up Android Studio and Emulators
  • Basics of adb
  • Decompiling and Recompiling apks
  • Drozer
  • Burp Suite
  • Code Modification Exploits
  • Finding code backdoors
  • Activity Exploits
  • Broadcast exploits
  • Content provider injection
  • Access control issues
  • Scoring Vulnerabilities with CVSS
  • Who Should Attend

  • Android developers looking to secure their applications
  • Hackers looking to learn common Android vulnerabilities
  • Bug Bounty participants looking to target Android apps
  • People looking to expand their knowledge of Computer Security
  • Target Audiences

  • Android developers looking to secure their applications
  • Hackers looking to learn common Android vulnerabilities
  • Bug Bounty participants looking to target Android apps
  • People looking to expand their knowledge of Computer Security
  • In this course, I will walk you through the process of penetration testing applications to find vulnerabilities and earn bug bounties. We will analyze a vulnerable Android app, and see how vulnerabilities can be found using tools such as:

  • Drozer

  • Dex2Jar

  • Jadx

  • ApkTool

  • Adb

  • Burp Suite

  • Learn about dynamic and static analysis to become an expert at finding Android exploits!

    Course Curriculum

    Chapter 1: Lab Setup

    Lecture 1: Installing Python and Android Studio

    Lecture 2: Setting up Decompilation Tools

    Lecture 3: Setting up the Insecure Bank App

    Lecture 4: Creating a Rooted Emulator

    Chapter 2: Information Gathering

    Lecture 1: Setting up Burp Suite for Android

    Lecture 2: Analyzing Server Interaction with Burp Suite

    Lecture 3: Pulling Apk Files from Android Devices

    Lecture 4: Decompiling APKs with Apktool and Dex2Jar

    Lecture 5: Installing Drozer and Scanning Attack Surfaces

    Chapter 3: APK modification exploits

    Lecture 1: Modifying Resource Files to Gain Escalated Privileges

    Lecture 2: Modifying Smali Code to Bypass Root Detection

    Chapter 4: Insecure Authentication Exploits

    Lecture 1: Login Backdoors

    Lecture 2: Exploting Unprotected Activities

    Chapter 5: Insecure Storage Exploits

    Lecture 1: Exploiting Poorly Implemented Cryptography

    Lecture 2: Analyzing SQLite Storage

    Lecture 3: Analyzing Logcat for Information Disclosures

    Chapter 6: Broadcast and Content Provider Exploits

    Lecture 1: Exploiting Broadcast Receivers

    Lecture 2: Exploiting Content Providers

    Chapter 7: General Bug Bounty Tips

    Lecture 1: CVSS Scoring and Report Tips

    Chapter 8: Bonus Resources

    Lecture 1: Bonus Resources

    Lecture 2: Learn More For Free!

    Instructors

  • The Complete Guide to Android Bug Bounty Penetration Tests  No.2
    Scott Cosentino
    Software Developer
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 2 votes
  • 3 stars: 9 votes
  • 4 stars: 18 votes
  • 5 stars: 42 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!