Setting Up An Android Pen-testing Environment on Ubuntu
ANDROID HACKING AND PENETRATION TESTING COURSE
Course Description
Android Hacking and Penetration Testing course is a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, students will learn various topics such as Android architecture, Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android malware etc. After finishing this course you will be able to perform Penetration testing on Android device and its applications
Who Should Take The Course?
The course does not require any prior knowledge or programming, the course is ideal for Penetration Testers, Security Enthusiasts, Developers and Students who are interested in Mobile Application Development and Penetration Testing.
SYLABUSS
Module - 1 Introduction
Introduction to the course
About the Instructors
Course Instructions
Need for Mobile Security OWASP Top 10 Mobile Risks
Module - 2 Lab Setup for the Course
Lab Setup
Installing Ubuntu on VMware
Setting Up an Android Pentesting Environment on Ubuntu
Module - 3 Getting Familiar with Android Developer tools
Eclipse IDE
Android Debug Bridge (ADB)
Module - 4 Android Architecture and Security Model
A Brief Intro To Android
Android Booting Process
Android’s Architecture
Android’s Data Structures and File Systems
Android Applications
Android Security Model
Android Permissions
Google Bouncer
Module - 5 Interacting With Android Devices
Differences between Android Emulator and Android Device
Interacting with Android Device via USB
All About Rooting
SSH
VNC
Busy Box
Module - 6 Android Network Analysis
Setting Up A Proxy for Android Emulator
Setting Up A Proxy for Android Device
Installing CA Certificate
Real World Man in the middle (MITM)
Real World SSL Man in the middle (MITM) Attacks
Data Manipulation
Module - 7 Android Reversing and Malware Analysis
APK files in a Nutshell
Introduction to Reverse Engineering
Reversing to get Source code of the Application
Reversing With APK tool
Introduction To Android Malwares
Static Analysis vs. Dynamic Analysis
Dynamic Analysis of Android Malwares
Static Analysis of Android Malwares
Introduction To Android Tamer
Dynamic Analysis Of Android Malware with Droid Box
Module - 8 Android Application Pentesting and Exploitation
Installing JSinfosec Vulnerable Applications
Introduction To Android Application Pentesting
Fuzzing Android Applications with Burp - Proxy
Fuzzing Android Applications with Burp – Intruder
Attacking Authentication
Content Provider Leakage
Client Side Injection
Insecure Data Storage - Shared Preferences
Insecure Data Storage - SQLite Data bases
Unintended Data Leakage
Broken Cryptography
Automated Security Assessments with Drozer
Exploiting Android Devices Using Metasploit
Module - 9 Android Device and Data Security
Android Device Protection
Bypassing Android Locks
Android Data Extraction
Module - 10 Using Android as a Pentesting Platform
A Look into Commonly used Penetration testing & Hacking Android Applications
PWN Pad on Nexus 7
Kali Linux on Android
Module - 11 Conclusion And Road Ahead
Android Pentesting Check List
Android Security Practices
Course Summary And Revision
Conclusion
▶️ DTube
▶️ IPFS