Android Penetration Testing 101
Offered By: Udemy
Course Description
Overview
What you'll learn:
- Enrollers are guided from the basic understanding of android architecture to Performing vulnerability assessment on android applications.
- After completion of the course, you'll be ready to perform vulnerability assessments on any android application.
- Having basic android knowledge would be more gain. However, we will be sharing the required knowledge in the course for the benefit of beginners.
- Android Penetration testers are very handful, you will be one among them at the end of the course.
The Android Penetration Testing 101 course is designed for beginners who are interested in exploring Android security but don't know where to start. This comprehensive course covers everything from understanding the Android architecture to analyzing Android applications using various attack vectors.
Throughout the course, you will learn how to perform static analysis on Android applications, including those developed with frameworks like React Native, Java, Flutter, and Cordova. You'll be introduced to essential tools such as Jadx, Jeb decompiler, and GDA decompiler, which aid in the static analysis process. Additionally, the course covers the installation and usage of automated scanners like MOBSF, enabling you to perform dynamic analysis on apps and identify common vulnerabilities. The course also highlights the key endpoints to focus on during static analysis.
One of the most exciting aspects of penetration testing is dynamic analysis. In this course, you'll understand why dynamic analysis is crucial for mobile applications and its role in vulnerability hunting. The course provides a step-by-step guide for setting up a dynamic analysis lab, featuring the use of Burp Suite with Genymotion. SSL pinning is a fundamental concept covered extensively in the dynamic analysis section. The course explores SSL pinning in detail and demonstrates various methods to bypass it on Android.
To enhance your dynamic analysis skills, the course introduces powerful tools like Frida and objection, and provides instructions on their setup and usage. The course concludes with a live dynamic analysis session on an Android application, during which you'll learn how to identify common vulnerabilities, locate relevant endpoints, and extract sensitive information from the app's database.
As a bonus, the course includes an Android pentesting checklist, which serves as a handy reference guide during real-time analysis, ensuring a smoother pentesting experience.
Taught by
Byte Theories
Related Courses
Advanced Cyber Security TrainingEC-Council via FutureLearn Advanced Python Scripting for Cybersecurity
Infosec via Coursera Ciberseguridad
Universidad de los Andes via Coursera Fundamentals of Computer Network Security
University of Colorado System via Coursera Ethical Hacking Course Certification
Cybrary