Practice Mobile Application Hacking and Penetration Testing against a number of real world mobile applications.
What you'll learn:
- + You will understand the different types of vulnerabilities that affect mobile applications and have the practical knowledge to attack and exploit them.
- + Perform real world attacks on Android Devices and Apps.
- + By the end of the course , You will learn How to Fuzz mobile apps.
- + OWASP Top Ten Mobile and Web most common vulnerabilities.
- + Build your own home lab on mobile application security.
- + By the end of the course , You will learn Mobile applications reverse engineering.
- + Practice on real world mobile applications.
- + Provides you the skills necessary to peform Penetration tests of mobile applications.
Description:
This course includes all necessary information to start your carrier in Cyber Security field. This course aims to teach you how to perform full penetration testing on Android Mobile applications.
Course at a glance:
- - Start from Android architectures basics.
- - Covers Mobile applications reverse engineering.
- - Practice on real world mobile applications.
- - Build your own home lab on mobile application security.
- - Provides you the skills necessary to perform Penetration tests of mobile applications.
Syllabus:
- + Introduction To Mobile Apps.
- + Mobile Application Security.
- + Mobile Application Penetration Testing.
- + The most common areas where we find mobile application data resides.
- + The Architecture of Android.
- + The App Sandbox and the Permission Model.
- + AndroidManifest.xml File.
- + Android Compilation Process.
- + Android Startup Process.
- + Android Application Components.
- + Setup a testing environment.
- + Android Debug Bridge (adb).
- + Digging deeper into Android (ADB tool).
- + intercept and analyze the network traffic.
- + Reversing an Android application.
- + OWASP top 10 vulnerabilities for mobiles.
- + Install DIVA (Damn insecure and vulnerable App).
- + Insecure Logging Issue.
- + Insecure Data Storage.
- + Database Insecure Storage.
- + Insecure Data Storage Inside Temporary Files.
- + Hardcoding Issues.
- + Input Validation Issues - SQL Injection.
- + Input Validation Issues - Exploiting Webview Vulnerability.
Copyright Disclaimer:
This
site does not store any files on its server. We only index and link to
content provided by other sites. Please contact the content providers to
delete copyright contents if any and email us, we'll remove relevant
links or contents immediately.
Tuyên bố miễn trừ bản quyền:
Trang web này không lưu trữ bất kỳ tệp nào trên máy chủ của nó. Chúng tôi chỉ lập chỉ mục và liên kết đến nội dung được cung cấp bởi các trang web khác. Vui
lòng liên hệ với các nhà cung cấp nội dung để xóa nội dung bản quyền
nếu có và gửi email cho chúng tôi, chúng tôi sẽ xóa các liên kết hoặc
nội dung có liên quan ngay lập tức.