This Course is still being made and videos are being added, Don't Review it till the course isn't completed, You can request Videos if you want by just sending us a msg.
Learn advanced techniques to find & exploit vulnerabilities in iOS and Android. Static & Dynamic Analysis for Mobile Apps
In this course, students are introduced to the security concepts related to iOS apps created in Swift and Objective-C. Intermediate-level principles are presented at the beginning of this intermediate-level course. This course covers a wide range of topics, including the structure of iOS applications, reversing iOS apps, and getting beyond client-side limitations like SSL pinning and jailbreak detection. It also demonstrates how iOS app vulnerabilities may be found and used against them. This course shows you how to spot several iOS app flaws including SQL Injection, Weak Jailbreak Detection, Insecure End-to-End Encryption, Insecure Data Storage, and others.
In this course, you will learn how to set up an Android lab using Burpsuite, hack Android apps, and learn how to intercept app traffic to identify security holes. way to check an app's functionality. Additionally, we'll introduce you to the FRIDA and Objection frameworks so you can learn about SSL unpinning, injecting Javascript code into active applications, and the most well-known Android vulnerabilities.
You will learn the following in this course:
Exploring the iOS and Android app ecosystems
Setting up a lab for iOS app testing
Setting up a lab for Android app testing
How to Start hacking on the iOS Platform
iOS Emulators and Corellium
Jailbreaking and SSL Pinning
How to find Vulnerabilities in Android Apps
Utilizing Various Android Emulators
Frida and Objection
Reverse engineering mobile apps to uncover vulnerabilities
Hands-on practice with static and dynamic analysis techniques
Testing for iOS and Android's OWASP Top 10 Vulnerabilities
iOS Apps Static and Dynamic Testing
Finding Frequently occurring Android and iOS application security issues
Protecting against various forms of vulnerabilities
Reporting and documenting vulnerabilities
Practical case studies in mobile bug bounty hunting
This will be a Dynamic Course, So If you find something missing here in the course, we will add it soon. You can suggest subjects and provide feedback on how to improve particular sections; we'll reward you for doing so and it'll help to make the course more interesting.