Companies Home Search Profile

Hacking Android Applications for Bug Bounty and Pentesting

Focused View

Jaimin Gohel,Nishith Khadadiya

4:41:55

155 View
  • 1 - Introduction to Course.mp4
    01:45
  • 2 - Introduction to Android Architecture.mp4
    03:35
  • 3 - Android Run time ART.mp4
    07:11
  • 4 - Rooting Basics.mp4
    05:15
  • 5 - Introduction to Genymotion.mp4
    07:24
  • 6 - Install apktool in Linux.mp4
    03:20
  • 7 - Install Frida Tools in Linux and Start Frida Server in Android.mp4
    06:11
  • 8 - Install adb in Linux.mp4
    02:28
  • 8 - resources.zip
  • 9 - Install Jadx in Linux.mp4
    03:14
  • 10 - Install MobSF in Linux.mp4
    08:04
  • 11 - Install Objection in Linux.mp4
    01:33
  • 12 - Install Runtime Mobile Security RMS in Linux.mp4
    05:10
  • 13 - Install Frida Tools in Windows.mp4
    01:48
  • 14 - Install apktool in Windows.mp4
    02:51
  • 15 - Install adb in Windows.mp4
    02:05
  • 16 - Install Jadx in Windows.mp4
    02:02
  • 17 - Install MobSF in Windows.mp4
    03:20
  • 18 - Install Objection in Windows.mp4
    01:08
  • 19 - Install Runtime Mobile Security RMS in Windows.mp4
    05:12
  • 20 - Pulling APK from deviceplaystore.mp4
    08:50
  • 21 - DecompileRecompile apk using apktool.mp4
    05:57
  • 22 - Taking the android app apart.mp4
    33:22
  • 23 - Patching application manually to enable WebView debugging.mp4
    23:01
  • 24 - Static vs Dynamic.mp4
    01:57
  • 25 - Intercept Traffic using Burpsuite.mp4
    06:34
  • 26 - Root Detection Bypass.mp4
    18:44
  • 27 - SSL Pinning Bypass.mp4
    12:38
  • 28 - Patching apps using objection.mp4
    11:53
  • 29 - Frida code share & Startup scripts.mp4
    09:50
  • 30 - Insecure Data File Storage Part 1.mp4
    03:22
  • 31 - Insecure Data File Storage Part 2.mp4
    02:38
  • 32 - Insecure Data Storage Example 1.mp4
    07:08
  • 33 - Insecure Data Storage Example 2.mp4
    06:46
  • 34 - Insecure Data Storage Example 3.mp4
    04:00
  • 35 - Hardcoding Issues Example 1.mp4
    02:55
  • 36 - Hardcoding Issues Example 2.mp4
    03:58
  • 37 - API Access Control Issues.mp4
    24:00
  • 38 - Report Periscope android app deeplink leads to CSRF in follow action.mp4
    04:02
  • 39 - Report Bypassing biometrics security functionality in Android.mp4
    03:01
  • 40 - Report Insecure deeplink leads to sensitive information disclosure.mp4
    04:02
  • 41 - Report Steal arbitrary files from mobile device.mp4
    03:02
  • 42 - Report Disclosure of all uploads via hardcoded api secret in Android app.mp4
    02:10
  • 43 - Report Insecure Data Storage in Vine Android App.mp4
    01:39
  • 44 - Report No Session Expiry on Password change action.mp4
    01:55
  • 45 - Conclusion.mp4
    00:55
  • Description


    Learn to hack Android applications using the cutting edge pentesting techniques and tools.

    What You'll Learn?


    • Android Ethical Hacking
    • Android Hacking
    • Fundamentals of Android
    • Android Lab & Device setup for Testing
    • Basics of Android Pentesting
    • Advanced Android Pentesting
    • History of Android
    • Android Ecosystem
    • Application Sandboxing
    • Android Components
    • Analysis of APK file Structure
    • Rooting Basics
    • Root Detection Bypass
    • SSL Pinning Bypass
    • Android Static Analysis with MobSF
    • Android Dynamic Analysis
    • Real World Reports Walkthrough
    • Android Bug Bounty

    Who is this for?


  • Beginner bug bounty hunter who wants to learn Android security
  • Security enthusiasts who wants to learn about Android security
  • What You Need to Know?


  • Basics of Web Application Security Knowledge
  • Basics of Linux
  • More details


    Description

    This course is designed to help you kick-start the journey of android pentesting with right tools and methodology. Information security is the ever-changing field, we bring the latest methodology to setup your own environment and get your hands dirty with the android pentesting.


    This course initiates with basics such as Android Architecture, what is Android Run time (ART), Android device Rooting Basics. Towards the intermediate concepts like Reversing Android Apps, Bypassing client side restrictions such as root detection, SSL Pinning etc. This course leverages multiple industry known & open source applications to demonstrate the test cases.


    This course will also teaches you how to identify a variety of Android App vulnerabilities such as Insecure Data Storage, Insecure Logging, Weak Jailbreak detection, insecure end to end encryption, Access Control issues in REST API etc.


    Essentially this course is designed to teach the general approach right from reversing the APK, to understand & identify vulnerabilities,  modifying the application logic to run the modified application in the android environment.


    The highlights of this course are:


    • Fundamentals of android

    • Lab Setup in Windows & Linux

    • Static & Dynamic Analysis

    • Intercept Traffic using Burpsuite

    • Root detection bypass

    • SSL Pinning Bypass

    • Patching apps using objection

    • Frida code share & Startup scripts

    • Reversing & patching applications manually

    • Smali Understanding

    • Identifying client side encryption

    • Real world findings walkthrough

    See you inside the course!

    Who this course is for:

    • Beginner bug bounty hunter who wants to learn Android security
    • Security enthusiasts who wants to learn about Android security

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Jaimin Gohel
    Jaimin Gohel
    Instructor's Courses
    I am a experienced Security Professional with a demonstrated history of working in the web, mobile, cloud and network security industry. I am Skilled in Vulnerability Assessment and Penetration testing. I have started my career in IT industry back in 2015, i have worked in backend programming as well.I have led null Ahmedabad - (Largest open security community in india) for more than 4 years.I have been a Technical speaker at various community events and conferences. Let's get on a journey to explore the infosec world together.
    Nishith Khadadiya
    Nishith Khadadiya
    Instructor's Courses
    I'm Nishith, also known as Busk3r online where I share educational content for people interested in ethical hacking and bug bounty hunting and security in general.I work as a full time penetration tester and do bug bounties in my free time. I have also presented in conferences and meetups and love to teach.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 45
    • duration 4:41:55
    • Release Date 2023/09/21