×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lecture
Complete and Continue
Advanced Mobile Application Penetration Testing
Android Application Penetration Testing - Part 1
1.1 Introduction to Android (4:25)
1.2 Android architecture (7:38)
1.3 Software Installation (7:06)
1.4 Creating an emulator (4:24)
2.1 Android Security Model (6:52)
2.2 App Sandboxing (8:02)
2.3 Secure Interprocess Communication (10:17)
2.4 Application Signing (8:18)
2.5 App Permissions (7:27)
3.1 App Structure (6:45)
3.2 Building a simple app (11:31)
4.1 Introduction (2:53)
4.2 M1-SharedPreferences (7:19)
4.3 M1-Shared Preferences (3:40)
4.4 M1 SQLITE (7:43)
4.5 M1 SQLITE (3:27)
4.6 Copy Paste Buffer (7:18)
4.7 Copy Paste Code (1:46)
4.8 Logging (5:11)
4.9 Logging Code (2:08)
4.10 Poor Authorization and Authentication (3:43)
4.11 Broken Crypto (8:17)
4.12 Client Side Injection-1 (3:30)
4.13 Look at the code (2:59)
4-14 Client Side Injection 2 (2:19)
4-15 A look at the code (2:45)
4-16 Improper Session Management (4:07)
4-17 Reversing intro (2:17)
4.18 APKTOOL (3:39)
4.19 dex2jar (3:24)
4.20 Finding Content URIs using APKTOOL (3:21)
Android Application Penetration Testing - Part 2
5.1 Setting up drozer (5:05)
5.2 Intent Spoofing (8:57)
5.3 Content Provider Leakage (7:02)
5.4 SQL Injection in Content Providers (9:54)
6.1 A look at android exploit mitigatioin techniques (3:53)
6.2 I m running ARM (2:46)
6.3 GDB setup (6:30)
6.4 Running a C program on your device (6:44)
6.5 Format String Vulnerability (9:56)
6.6 Transport Layer Security - SSL (7:22)
7.1 Overview of Android forensics Forensics (9:32)
7.2 SQLite data recovery (5:26)
iOS Application Penetration Testing - Part 1
1-Course-Introduction (6:17)
2-credits (3:01)
3-introduction-to-ios (4:25)
4-ios-app-basicsmp4 (4:03)
5-ios-architecturemp4 (9:11)
6-setting-up-xcode (7:47)
7-adding-functionality-to-helloworld-app (10:00)
8-Inbuilt-security-model (9:06)
9-SECURITY CONTROLs (7:28)
10-JAILBREAKING BASICS (7:42)
11-INSTALLATIONS (18:24)
12-INSTALLING CHALLANGE APPS (7:50)
13-IOS APP DIRECTORY STRUCTURE (12:03)
14-SQLITE DATA (10:52)
15-PLIST FILES (6:06)
16-NSUSER DEFAULTS (3:42)
17-CORE-DATA (5:38)
18-KEYCHAIN (9:14)
19-LOGGING (4:20)
iOS Application Penetration Testing - Part 2
20-APP BACKGROUNDING (6:02)
21-KEYBOARD CACHE (3:27)
22-PASTEBOARD (2:51)
23-SQL INJECTION (4:52)
24-CROSS-SITE SCRIPTING ATTACKS - XSS (5:14)
25-INTERCEPTING HTTP TRAFFIC (8:59)
26-INTERCEPTING HTTPS TRAFFIC (7:18)
27-MONITORING NETWORK TRAFFIC(TCPIP) (6:17)
28-DUMPING CLASS INFORMATION OF PREINSTALLED APPS (6:19)
29-DUMPING CLASS INFORMATION OF APPS INSTALLED FROM APP STORE (8:51)
iOS Application Penetration Testing - Part 3
30-CYCRIPT BASICS (13:50)
31-RUNTIME CODE INJECTION USING CYCRIPT (5:13)
32-ACCESSING AND MODIFYING VARIABLES USING CYCRIPT (6:36)
33-EXPLOITING AUTHENTICATION USING CYCRIPT (6:36)
34-METHOD SWIZZLING USING CYCRIPT (5:49)
35-BYPASSING JAILBREAK DETECTION USING CYCRIPT (9:44)
36-METHOD SWIZZLING USING SNOOP-IT (12:06)
37-APP MONITORING USING SNOOP-IT (3:28)
38-RUNTIME ANALYSIS WITH GDB (8:47)
39-RUNTIME ANALYSIS USING SNOOP-IT (12:06)
40-CYDIA DEFAULT PASSWORD EXPLOITATION WITH METASPLOIT (8:12)
41-CRACKING OPENSSH PASSWORDS USING HYDRA (5:23)
42-METASPLOIT BINDSHELL ON IDEVICES (7:47)
43-METASPLOIT REVERSE SHELL IDEVICES (8:46)
44-INTRODUCTION TO REVERSE ENGINEERING (8:49)
45-REVERSING IOS APPS-1 (5:01)
46-REVERSING IOS APPS-2 (6:48)
47-REVERSING IOS APPS-3 (3:47)
48-REVERSING IOS APPS-4 (5:19)
5.3 Content Provider Leakage
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock