This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Advanced Android Hacking and Penetration Testing Course
1.INTRODUCTION
1.Promo (3:29)
2.Introduction (3:32)
3.Pentesting White and Black box (1:40)
2.TOOLS
1. Genymotion Setup (3:09)
2.Installing Terminal (1:22)
3.Burp Suite Installation (4:11)
4.Setting up ADB (2:29)
5.Genymotion Proxy (2:36)
6.Certificate (3:52)
7.Application Security (5:07)
8.Unzip (2:12)
9.Apktool (2:54)
10. Dex2jar (5:23)
11.File Permission Present in Android (1:40)
12.Android Database (2:03)
3.PRACTICAL
1.Android Application Teardown (3:12)
2.Application Signing (6:15)
3.Top 10 Security issues (1:04)
4. Top 10 Vulnerability Exploitation (3:43)
5. Lesser known Android Attacks (3:38)
6.Finding Vulnerabilities with Fuzz Testing (4:33)
7.Android Startup Process (5:00)
8.Digging Deeper (2:20)
9.Android Traffic Interception (1:30)
4.ANALYSIS
1.Passive Analysis 1 (3:04)
2.Passive Analysis 2 (4:27)
3.Active Analysis (3:21)
5.VULNERABILITY
1. File System Partition (2:11)
2.AF-logical (3:04)
3.Logcat (3:36)
4.Information Leakage via Logcat Report (1:49)
5.Fetching Data (3:29)
6.SQlite (5:38)
7.Insecure Data Storage (1:46)
8. Possible to Steal any Protected files on Android Report (1:56)
9.Account Hijacking Possible through ADB backup Feature Report (1:27)
10.Webview Vulnerablity Report (2:03)
11. Cross-Application Scripting in Android (1:28)
12.Vulnerable to JavaScript Injection Report (1:21)
13.HTML or XSS rendered in Android App (1:21)
14.File Permission (2:29)
15.Client-side Attack Surface (2:02)
16.Client-side Attack Surface 2 (3:08)
17.Local Attack Surfaces (2:29)
18.Physical Attack Surfaces (2:38)
19.Attacking the Radio Interface Layer (2:05)
20.Debugging and Analyzing Vulnerabilities (2:44)
21.Exploit Mitigations (6:36)
6.MISCELLANEOUS REPORTS
1.Authentication Failed Mobile Version Report (1:08)
2. Manifest allows for ADB backup attack when USB debugging is enabled report (2:03)
3. Shopify Android Client all API Request's Response Leakage Report (2:33)
4. Multiple Critical Vulnerabilities in Odnoklassniki Android Application Report (2:23)
5.Email Leak in Transactions in Android App Report (0:51)
6. Android Address Bar Spoofing Vulnerability Report (2:45)
7.Bypass Pin (1:49)
8 .Coinbase Android Application - Bitcoin Wallet Leaks OAuth Response Code report (1:15)
9.Content Provider Information Leakage report (1:39)
12.Vulnerable to JavaScript Injection Report
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock