Penetration Testing With Kali Linux
50 lectures   5 hours  All Levels
Price 3000 Rs.
Preview this course

Android Application Penetration Testing Online Course

Android Application Penetraion Testing Course: Android Application Penetration Testing is a division of PENETRATION TESTING Domain that concentrates on PenTesting

Android applications on Android devices like mobiles and tablets.
This course is intended students/professionals who are intended to make career in mobile penetration testing domain.
The course covers in and out of , actually Hacking (Penetration)

Android Apps and hacker computer school have developed vulnerable

Android Apps for students to practice Labs.  hacker computer school will share 14 such applications to learn Hacking Android Mobile Applications with crack challenges. Both hacker computer school iOS and Android Application Penetration Testing course is a highly practical and hands on video course. This course focuses on beginners as well as advanced users. Instructor has created all the required vulnerable applications in order for you to practice all the hands-on exercises demonstrated in this course in a legal environment. This course begins with very basics keeping beginners in mind. Even if you have worked on some Android app security assessments, there will be something new for you. After completing this course, you will learn where to start iOS app penetration testing, Pentesting iOS Apps, Network monitoring on iDevices and finally some automated tools to complete the task. It contains more than 14 challenges to crack. Instructor explains all the solutions when and where it is required.

The course is designed as a complete guide to understand and practice Android Mobile app hacking efficiently in real time. This is online certification Course by InSEC-Techs and your doubts related to the subject are solved for ever on discussion board. We provide you material and references to get more understanding and learning this tool. The course is very well structured, explaining the terminologies , functionality and lab practicals are very well shown as feeding baby a banana.
Curriculum For This Course

Android Architecture
Android exploitation mitigation techniques
Android Forensics
Android Security Model Basics
App Permissions
App Sandboxing
Application Signing
ARM - Advanced Risc Machines
Building a simple App
Creating an Emulator
Exploiting content provider leakage
Format string vulnerabilities in ARM
Format string vulnerabilities in ARM
Introduction
M1 - Introduction
M2 - SQLITE Data Storage - Look at code-2372418
M2 -Insecure Data Storage - Shared Preferences - Look at Code-2372398
M2 -Insecure Data Storage - Shared Preferences-2372396
M2 Insecure Data Storage - SQLITE Database-2372672
M3 – Insufficient Transport layer protection --- Intercepting HTTPS traffic-2372444
M3 – Insufficient Transport layer protection --- The Coffee shop attack-2372466
M3 – Insufficient Transport layer protection _ Intro & HTTP traffic interception-2372426
M3 Insufficient Transport .._ Passive analysis with tcpdump & Wireshark-2372472
M4 – Unintended Data Leakage -- Reading the clipboard - Look at Code-2372496
M4 – Unintended Data Leakage -- Reading the clipboard-2372488
M4 – Unintended Data Leakage --Logging -- Look at Code-2372520
M4 – Unintended Data Leakage --Logging-2372504
M5 - Poor Authentication and Authorization-2372526
M6 - Broken Cryptography-2372532
M7 - frame injection in webviews -- Look at Code-2372556
M7 - frame injection in webviews-2372548
M7 - SQL INJECTION -- LOOK AT CODE-2372538
M7 – Client Side Attack-- SQL Injection at Client Side-2372534
M8 – Security Decisions via untrusted inputs -- Intent Spoofing-2372580
M9 – Improper Session Handling-2372590
M10 - Finding Content Provider URIs using APKTOOL.-2372686
M10 - Reversing android apps with APKTOOL-2372684
M10 - Reversing android apps with dex2jar & JD-GUI-2372680
M10 – Lack of binary protection -- Introduction-2372678
Running a C programe on android device.-2372624
Secure interprocess communication-2371578
Setting up Drozer-2372598
Setting up GDB for debugging-2372622
Software Installations-2371560
SQL Injection in content provider-2372614
Understanding Android App Structure-2371606

About the Instructor

Aakash Thakur

is a Ethical Hacker / Penetration Tester / Forensic Investigators   by profession and a Technology Lover by other means. He loves to work with new technologies around. He is one of Active member at Microsoft Windows Community for India. He also loves trouble shooting and sharing Technical Knowledge believing "Sharing is
Copyright © 2018 Hacker Computer School  All Rights Reserved