×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lecture
Complete and Continue
Android Application Penetration Testing Training
Introduction to Android
Introduction (4:25)
Android Architecture (7:38)
Software Installations (7:06)
Creating an Emulator (4:24)
Android Security Model
Android Security Model Basics (6:52)
App Sandboxing (8:02)
Secure interprocess communication (10:17)
Application Signing (8:18)
App Permissions (7:27)
App Development Basics
Understanding Android App Structure (6:45)
Building a simple App (11:31)
Seurity Auditing of Android Apps : OWASP top 10
M1: Introduction (2:53)
M2:Insecure Data Storage: Shared Preferences (7:19)
M2:Insecure Data Storage: Shared Preferences: Look at Code (3:40)
M2 Insecure Data Storage: SQLITE Database (7:43)
M2: SQLITE Data Storage: Look at code (3:27)
M3 – Insufficient Transport layer protection / Intro & HTTP traffic interception (9:43)
M3 – Insufficient Transport layer protection --- Intercepting HTTPS traffic (7:22)
M3 – Insufficient Transport layer protection --- The Coffee shop attack (10:15)
M3 Insufficient Transport ../ Passive analysis with tcpdump & Wireshark (7:40)
M4 – Unintended Data Leakage -- Reading the clipboard (7:18)
M4 – Unintended Data Leakage -- Reading the clipboard - Look at Code (1:46)
M4 – Unintended Data Leakage --Logging (5:11)
M4 – Unintended Data Leakage --Logging -- Look at Code (2:08)
M5: Poor Authentication and Authorization (3:43)
M6: Broken Cryptography (8:17)
M7 – Client Side Attack-- SQL Injection at Client Side (3:30)
M7 - SQL INJECTION -- LOOK AT CODE (2:59)
M7 - frame injection in webviews (2:19)
M7 - frame injection in webviews -- Look at Code (2:45)
M8 – Security Decisions via untrusted inputs -- Intent Spoofing (5:10)
M9 – Improper Session Handling (4:07)
M10 – Lack of binary protection -- Introduction (2:17)
M10 - Reversing android apps with APKTOOL (3:39)
M10 - Reversing android apps with dex2jar & JD-GUI (3:24)
M10 - Finding Content Provider URIs using APKTOOL. (3:21)
Automated security assessments with Drozer
Setting up Drozer (5:05)
Intent Spoofing (8:57)
Exploiting content provider leakage (7:02)
SQL Injection in content provider (9:54)
Native Exploitation
Android exploitation mitigation techniques (3:53)
ARM - Advanced Risc Machines (2:46)
Setting up GDB for debugging (6:30)
Running a C programe on android device. (6:44)
Format string vulnerabilities in ARM (9:56)
Android Forensics
Android Forensics (9:32)
SQLite data recovery (5:26)
Materials
Android application penetration testing : Pdf
New Lecture
M3 – Insufficient Transport layer protection --- Intercepting HTTPS traffic
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock