Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Android Application Security
Introduction
Teaser - Android Application Security (1:18)
Basics of Android Security
Android OS Architecture and Permission Model (17:20)
Android App components (9:42)
Various types of Mobile Apps (12:24)
Setting Up A Penetration Testing Lab
Genymotion Emulator & Mobexler Setup (7:22)
Getting started with adb (15:38)
Setting up Proxy(MITM) (13:22)
Reversing engineering an android application
Analyzing APK manually (11:22)
Challenge solution (10:46)
Static Analysis
Mobile Security Framework (6:40)
SSL Pinning bypass
Bypassing SSL Pinning using Frida and Objection (8:59)
Bypassing SSL Pinning using Xposed framework (2:18)
Additional Video - Android Network Traffic Capture (11:59)
Root detection bypass
Xposed framework module (4:26)
Android app vulnerabilities
Sensitive data leakage via logs (8:48)
Unintentional data leakage (8:50)
Insecure Data Storage (8:58)
Exploiting Android broadcasts (Intent Sniffing) (6:43)
Media Projection in Android (7:45)
Understanding Android Links (Deeplinks) (4:59)
Finding & exploiting Deep links (8:02)
Pentesting On A Non-rooted Device
Patching Android Apps with Objection (8:47)
Security testing with Drozer
Introduction to Drozer (6:55)
Dynamic Analysis using Drozer (16:34)
Scripting Drozer Module (16:51)
Testing Xamarin Apps
Static analysis of Xamarin Apps (15:48)
Getting Started With Reverse Engineering
Basics of Reverse Engineering with Radare2 - Part 1 (30:43)
Basics of Reverse Engineering with Radare2 - Part 2 (8:25)
Basics of Reverse Engineering with Radare2 - Part 3 (38:04)
Additional Videos
Penetration Testing with QARK (26:24)
Interacting with memory using GNU debugger (16:20)
Credit and Thanks
Credit and Thanks (1:10)
Insecure Data Storage
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock