Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
992Proxy

Locked Ethical Hacking for Android Apps and Devices


itsMe

Recommended Posts

This is the hidden content, please

What you'll learn

  •     History of Android
  •     Android Ecosystem
  •     Android Architecture
  •     Android Software Stack
  •     Android Run time (ART)
  •     Analysis of APK file Structure in Android Studio
  •     Android's Security Model
  •     Application Sandboxing
  •     Permissions and Selinux
  •     Developer overview for Android apps
  •     Creating an Android virtual device
  •     Android Components
  •     Developing a basic android app
  •     Connect Emulator or real device and Kali
  •     Rooting Basics
  •     Reverse Engineering an APK file
  •     Information Gathering
  •     Repackaging and Resigning an APK
  •     Static Analysis with MobSF
  •     Root Detection
  •     Obfuscation Techniques
  •     OWASP Mobile Top 10 Vulnerabilities
  •     Android Pentesting on vulnerable mobile apps


Requirements

  •     4 GB (Gigabytes) of RAM or higher (8 GB recommended)
  •     64-bit system processor is mandatory
  •     10 GB or more disk space
  •     Enable virtualization technology on BIOS settings, such as “Intel-VTx”
  •     All items referenced in this course are Free
  •     A strong desire to understand hacker tools and techniques
  •     A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
  •     Nothing else! It’s just you, your computer and your ambition to get started today

At the end of the course you will learn;

  •     History of Android
  •     Android Ecosystem
  •     Android Architecture
  •     Android Software Stack
  •     Android Run time
  •     Analysis of APK file Structure in Android Studio
  •     Android's Security Model
  •     Application Sandboxing
  •     Permissions and Selinux.
  •     Developer overview for Android apps
  •     Create an Android virtual device
  •     Android Components
  •     Developing a basic android app
  •     Connect Emulator or real device and Kali
  •     Rooting basics
  •     Reverse Engineering an APK file
  •     Information Gathering,
  •     Repackaging and Resigning an APK
  •     Static Analysis with MobSF
  •     Root Detection and Obfuscation Techniques.
  •     OWASP Mobile Top 10 Vulnerabilities
  •     Android Pentesting on vulnerable mobile apps
This is the hidden content, please

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.