HOME > IT & Software > Hacking and Pentesting Android Applications

Hacking and Pentesting Android Applications

SynopsisHacking and Pentesting Android Applications, available at $74...
Hacking and Pentesting Android Applications  No.1

Hacking and Pentesting Android Applications, available at $74.99, has an average rating of 4.43, with 48 lectures, based on 725 reviews, and has 4699 subscribers.

You will learn about Learn the fundamentals of Android Application Penetration Testing Learn how to Reverse Engineer Android Apps Learn how to patch Android Apps using apktool to bypass SSL Pinning Learn how to bypass Jailbreak detection in Android Apps using objection Learn how to trace crypto calls made by an Android app using Frida Learn Android Application Penetration Testing using the modern day tools and techniques – Good Bye to old school tools Learn how to use Frida to invoke functions from within the App Learn Mobile App Pentesting to begin your bug bounty journey This course is ideal for individuals who are Penetration Testers or Mobile Application Developers or Security professionals who are interested in Mobile App Security or Anyone who is interested in ethical hacking and penetration testing or Anyone who is interested in information security concepts It is particularly useful for Penetration Testers or Mobile Application Developers or Security professionals who are interested in Mobile App Security or Anyone who is interested in ethical hacking and penetration testing or Anyone who is interested in information security concepts.

Enroll now: Hacking and Pentesting Android Applications

Summary

Title: Hacking and Pentesting Android Applications

Price: $74.99

Average Rating: 4.43

Number of Lectures: 48

Number of Published Lectures: 48

Number of Curriculum Items: 48

Number of Published Curriculum Objects: 48

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Learn the fundamentals of Android Application Penetration Testing
  • Learn how to Reverse Engineer Android Apps
  • Learn how to patch Android Apps using apktool to bypass SSL Pinning
  • Learn how to bypass Jailbreak detection in Android Apps using objection
  • Learn how to trace crypto calls made by an Android app using Frida
  • Learn Android Application Penetration Testing using the modern day tools and techniques – Good Bye to old school tools
  • Learn how to use Frida to invoke functions from within the App
  • Learn Mobile App Pentesting to begin your bug bounty journey
  • Who Should Attend

  • Penetration Testers
  • Mobile Application Developers
  • Security professionals who are interested in Mobile App Security
  • Anyone who is interested in ethical hacking and penetration testing
  • Anyone who is interested in information security concepts
  • Target Audiences

  • Penetration Testers
  • Mobile Application Developers
  • Security professionals who are interested in Mobile App Security
  • Anyone who is interested in ethical hacking and penetration testing
  • Anyone who is interested in information security concepts
  • This course is created with an idea of saying Bye Bye to outdated Android application penetration testing tools and techniques. Let us learn Android Application Penetration Testing the right way with right tools and techniques.

    This course introduces students to the security concepts associated with Android Apps developed using Android Programming Language. This is an intermediate level course, which begins with beginner level concepts. This course covers a variety of concepts such as Android Application structure, Reversing Android Apps, Bypassing client side restrictions such as root detection, SSL Pinning etc. This course uses two vulnerable applications developed by the instructor to demonstrate how Android App vulnerabilities can be identified and exploited. This course teaches you how to identify a variety of Android App vulnerabilities such as Insecure Data Storage, Insecure Logging, Weak Jailbreak detection, insecure end to end encryption, SQL Injection etc.

    The best part of the course is that you will get a detailed understanding of how to trace an Android app’s runtime and write a bunch of Frida scripts to pentest the target applications.  The best part of the course is that you will get a detailed understanding of how to trace an Android app’s runtime and write a bunch of Frida scripts to pentest the target applications.

    Course Curriculum

    Chapter 1: Course Introduction

    Lecture 1: Course Introduction

    Chapter 2: Introduction

    Lecture 1: Introduction

    Lecture 2: APK File structure

    Lecture 3: Exploring Android Apps on the device

    Chapter 3: Setting up Android Pentesting Lab

    Lecture 1: Introduction

    Lecture 2: Android lab setup pre-requisites

    Lecture 3: Challenges with Android lab setup

    Lecture 4: Vulnerable Apps & VM – Download

    Lecture 5: Lab setup using an Android emulator

    Lecture 6: Lab setup using a Non Rooted Android Phone

    Chapter 4: Android Application Penetration Testing – Basics

    Lecture 1: Introduction

    Lecture 2: Introduction to Android App Pentesting

    Lecture 3: Reversing Android Apps with APKTOOL

    Lecture 4: Reversing Android Apps with dex2jar and JD-GUI

    Lecture 5: Intercepting HTTP Traffic

    Lecture 6: Intercepting HTTPS Traffic

    Lecture 7: Insecure Data Storage vulnerabilities

    Lecture 8: Server Side Vulnerabilities

    Lecture 9: Introduction to client side vulnerabilities

    Lecture 10: Weak Crypto and Authorization Vulnerabilties

    Lecture 11: Exported Application Components

    Lecture 12: Insecure Logging

    Lecture 13: Client Side Injection

    Lecture 14: Clipboard – Copy Paste issues

    Chapter 5: Android Application Penetration Testing – Advanced

    Lecture 1: Introduction

    Lecture 2: Introduction to client side protections in Android Apps

    Lecture 3: Introduction to Frida

    Lecture 4: Root Detection Bypass using Objection

    Lecture 5: Insecure Local Data Storage – Revisited

    Lecture 6: Client side SQL Injection – Revisited

    Lecture 7: Traffic Analysis – Revisited

    Lecture 8: Introduction to Frida CLI

    Lecture 9: How Frida Scripts work?

    Lecture 10: Creating a JavaScript template for writing Frida Scripts

    Lecture 11: Enumerating loaded classes using Frida

    Lecture 12: Getting class properties using Frida

    Lecture 13: Bypassing Root Detection using Frida

    Lecture 14: Dumping string arguments using Frida

    Lecture 15: Tracing WebView calls using Frida

    Lecture 16: Introduction to end to end encryption

    Lecture 17: Dumping encryption keys using Frida

    Lecture 18: SQL Injection with encrypted Payloads

    Lecture 19: Introduction to SSL Pinning

    Lecture 20: Bypassing SSL Pinning using Frida

    Lecture 21: Fixing errors in SSL Pinning Bypass script

    Lecture 22: Reversing and Patching Android Apps to bypass SSL Pinning

    Chapter 6: Conclusion

    Lecture 1: Conclusion

    Chapter 7: Bonus Section

    Lecture 1: Bonus Lecture

    Instructors

  • Hacking and Pentesting Android Applications  No.2
    Srinivas .
    Your instructor
  • Rating Distribution

  • 1 stars: 10 votes
  • 2 stars: 10 votes
  • 3 stars: 66 votes
  • 4 stars: 252 votes
  • 5 stars: 387 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!