Android Applications Hacking for Bug Bounty and Pentesting

Learn to hack Android applications using the cutting edge pentesting techniques and tools.

Ratings 3.36 / 5.00
Android Applications Hacking for Bug Bounty and Pentesting

What You Will Learn!

  • Android Ethical Hacking
  • Android Hacking
  • Fundamentals of Android
  • Android Lab & Device setup for Testing
  • Basics of Android Pentesting
  • Advanced Android Pentesting
  • History of Android
  • Android Ecosystem
  • Application Sandboxing
  • Android Components
  • Analysis of APK file Structure
  • Rooting Basics
  • Root Detection Bypass
  • SSL Pinning Bypass
  • Android Static Analysis with MobSF
  • Android Dynamic Analysis
  • Real World Reports Walkthrough
  • Android Bug Bounty
  • Android Studio
  • Android Hack
  • Hack Android
  • Hack Android Phone
  • Hack Android Mobile
  • Android
  • Static Analysis with MobSF
  • Android App Development
  • Hacking
  • Ethical Hacking And Penetration Testing
  • Obfuscation Techniques
  • Repackaging and Resigning an APK
  • Reverse Engineering an APK file
  • Creating an Android Virtual Device
  • Analysis of APK file Structure in Android Studio
  • Android Run time (ART)
  • History of Android
  • Android's Security Model
  • Android Architecture

Description

Welcome to our course: Android Applications Hacking for Bug Bounty and Pentesting


This course is designed to help you kick-start the journey of android pentesting with right tools and methodology. Information security is the ever-changing field, we bring the latest methodology to setup your own environment and get your hands dirty with the android pentesting.


This course initiates with basics such as Android Architecture, what is Android Run time (ART), Android device Rooting Basics. Towards the intermediate concepts like Reversing Android Apps, Bypassing client side restrictions such as root detection, SSL Pinning etc. This course leverages multiple industry known & open source applications to demonstrate the test cases.


This course will also teaches you how to identify a variety of Android App vulnerabilities such as Insecure Data Storage, Insecure Logging, Weak Root detection, insecure end to end encryption, Access Control issues in REST API etc.


Essentially this course is designed to teach the general approach right from reversing the APK, to understand & identify vulnerabilitiesmodifying the application logic to run the modified application in the android environment. This course is for all levels. We will take you from beginner to advance level. You will learn step-by-step with hands-on demonstrations.


The highlights of this course are:


  • Fundamentals of android

  • Lab Setup in Windows & Linux

  • Static & Dynamic Analysis

  • Intercept Traffic using Burpsuite

  • Root detection bypass

  • SSL Pinning Bypass

  • Patching apps using objection

  • Frida code share & Startup scripts

  • Reversing & patching applications manually

  • Smali Understanding

  • Identifying client side encryption

  • Real world findings Walkthrough

See you inside the course!

Who Should Attend!

  • Beginner bug bounty hunter who wants to learn Android security
  • Security enthusiasts who wants to learn about Android security

TAKE THIS COURSE

Tags

  • Cyber Security
  • Ethical Hacking
  • Mobile Testing
  • Bug Bounty

Subscribers

488

Lectures

54

TAKE THIS COURSE



Related Courses