Description
This course includes customized VM with pre-installed tools which will save your time in installing multiple tools required for penetration testing of mobile applications.
– Start from Android architectures basics.
– Get a Customized VM with pre-installed tools
– Automated the Mobile Application Testing Process
– Covers Mobile applications reverse engineering.
-Practice on real world mobile applications.
– Build your own home lab on mobile application security.
– Provides you the skills necessary to perform Penetration tests of mobile applications.
– Automate the process of Mobile Testing
– Cover OWASP Top 10 vulnerabilities
Syallabus includes:-
Syllabus:
- Introduction To Mobile Apps.
- Mobile Application Security.
- Mobile Application Penetration Testing.
- The most common areas where we find mobile application data resides.
- The Architecture of Android.
- The App Sandbox and the Permission Model.
- AndroidManifest.xml File.
- Android Compilation Process.
- Android Startup Process.
- Android Application Components.
- Setup a testing environment.
- Android Debug Bridge (adb).
- intercept and analyze the network traffic.
- Reversing an Android application.
- OWASP top 10 vulnerabilities for mobiles.
- Install DIVA (Damn insecure and vulnerable App).
- Insecure Logging Issue.
- Insecure Data Storage.
- Database Insecure Storage.
- Insecure Data Storage Inside Temporary Files.
- Hardcoding Issues.
- Introduction To Mobile Apps.
- Mobile Application Security.
- Mobile Application Penetration Testing.
- The most common areas where we find mobile application data resides.
- The Architecture of Android.
- The App Sandbox and the Permission Model.
- AndroidManifest.xml File.
- Android Compilation Process.
- Android Startup Process.
- Android Application Components.
- Setup a testing environment.
- Android Debug Bridge (adb).
- intercept and analyze the network traffic.
- Reversing an Android application.
- OWASP top 10 vulnerabilities for mobiles.
- Install DIVA (Damn insecure and vulnerable App).
- Insecure Logging Issue.
- Insecure Data Storage.
- Database Insecure Storage.
- Insecure Data Storage Inside Temporary Files.
- Hardcoding Issues.
NOTE: This course is created for educational purposes only.
Who this course is for:
- Penetration testers
- Forensers
- Mobile App Developers
- IT personnel
- Anyone who has a personal or professional interest in attacking mobile applications.
- All who wants to start their carrier in android security.
Who this course is for:
- Android Penetration Testing
Requirements
- Learning Mindset
Last Updated 6/2020
Download Links
Direct Download
Mobile Penetration Testing – Android (2021 with inbult tool).zip (612.2 MB) | Mirror
Torrent Download
Mobile Penetration Testing – Android (2021 with inbult tool).torrent (53 KB) | Mirror
Source : https://www.udemy.com/course/penetration-testing-of-mobile-applications-android-2021/