- Регистрация
- 27 Авг 2018
- Сообщения
- 37,406
- Реакции
- 529,285
- Тема Автор Вы автор данного материала? |
- #1
What you'll learn
- You will understand the different types of vulnerabilities that affect mobile applications and have the practical knowledge to attack and exploit them.
- Perform real world attacks on Android Devices and Apps.
- By the end of the course , You will learn How to Fuzz mobile apps.
- OWASP Top Ten Mobile and Web most common vulnerabilities.
- Build your own home lab on mobile application security.
- By the end of the course , You will learn Mobile applications reverse engineering.
- Practice on real world mobile applications.
- Provides you the skills necessary to peform Penetration tests of mobile applications.
- Basic knowledge of programming fundamentals.
- A desire to learn.
Course at a glance:
- Start from Android architectures basics.
- Covers Mobile applications reverse engineering.
- Practice on real world mobile applications.
- Build your own home lab on mobile application security.
- Provides you the skills necessary to perform Penetration tests of mobile applications.
Syllabus:
- Introduction To Mobile Apps.
- Mobile Application Security.
- Mobile Application Penetration Testing.
- The most common areas where we find mobile application data resides.
- The Architecture of Android.
- The App Sandbox and the Permission Model.
- AndroidManifest.xml File.
- Android Compilation Process.
- Android Startup Process.
- Android Application Components.
- Setup a testing environment.
- Android Debug Bridge (adb).
- Digging deeper into Android (ADB tool).
- intercept and analyze the network traffic.
- Reversing an Android application.
- OWASP top 10 vulnerabilities for mobiles.
- Install DIVA (Damn insecure and vulnerable App).
- Insecure Logging Issue.
- Insecure Data Storage.
- Database Insecure Storage.
- Insecure Data Storage Inside Temporary Files.
- Hardcoding Issues.
- Input Validation Issues - SQL Injection.
- Input Validation Issues - Exploiting Webview Vulnerability.
NOTE: This course is created for educational purposes only.
Who this course is for:
- Forensers
- Mobile App Developers
- IT personnel
- Anyone who has a personal or professional interest in attacking mobile applications.
- All who wants to start their carrier in android security.
- Penetration testers
DOWNLOAD: