/> Advanced Mobile Application Penetration Testing | WeGeek

Advanced Mobile Application Penetration Testing

Practice Mobile Application Hacking and Penetration Testing against a number of real world mobile applications.

 

What you’ll learn?

 

  • Set up a lab environment to practice hacking
  • Install Kali Linux – a penetration testing operating system
  • Install windows & vulnerable operating systems as virtual machines for testing
6325 students Enrolled
  • (491 Reviews)

Curiculum

Introduction to the course

Get your course goals

Instructors

Admin bar avatar
HQ Traing

Developer

He has a Master of Science in Network Systems and a Bachelor of Science in Software Engineering. He is also a Microsoft Certified Application Developer, Technology Specialist (Web Applications) and Professional. Outside the software world, he is a photographer, a pianist and a passionate Latin dancer.
User Rating

4.1 average based on 254 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Benefits

Industry-Recognized Certification

After completion of each course, you will be entitled with valid certification that will recognize your efforts of particular field. Share your achievement with your friends, family and organization for your career growth.

certificate.1

Description

ANDROID & iOS Penetration Testing Course ? is a division of PENETRATION TESTING Domain that concentrates on PenTesting ANDROID & iOS Mobile Apps. ?This course is for students/professionals who are intended to make career in mobile application penetration testing domain. 

?The course covers in and out of , actually Hacking (Penetration) ANDROID & IOS Apps and INSEC-TECHS have developed vulnerable ANDROID & IOS Apps for students to practice Labs. INSEC-TECHS will share 20+ such applications to learn Hacking ANDROID & IOS Mobile Applications. ANDROID & IOS Application Penetration Testing course is a highly practical and hands on video course. This course focuses on beginners as well as advanced users. Instructor has created all the required vulnerable applications in order for you to practice all the hands-on exercises demonstrated in this course in a legal environment. This course begins with very basics keeping beginners in mind. Even if you have worked on some ANDROID & IOS app security assessments, there will be something new for you. After completing this course, you will learn where to start mobile app penetration testing, Network monitoring on iDevices & Android devices and finally some automated tools to complete the task. It contains more than 20+ challenges to crack. Instructor explains all the solutions when and where it is required.

The mobile application security training course is designed as a complete guide to understand and practice Mobile app hacking efficiently in real time.

This is online Course by InSEC-Techs and your doubts related to the subject are solved for ever on discussion board. We provide you material and references to get more understanding and learning this tool. 

The course is very well structured, explaining the terminologies , functionality and lab practicals are very well shown.

 

Class Curriculum

    Android Application Penetration Testing - Part 1

  • 1.1 Introduction to Android (4:25)
  • 1.2 Android architecture (7:38)
  • 1.3 Software Installation (7:06)
  • 1.4 Creating an emulator (4:24)
  • 2.1 Android Security Model (6:52)
  • 2.2 App Sandboxing (8:02)
  • 2.3 Secure Interprocess Communication (10:17)
  • 2.4 Application Signing (8:18)
  • 2.5 App Permissions (7:27)
  • 3.1 App Structure (6:45)
  • 3.2 Building a simple app (11:31)
  • 4.1 Introduction (2:53)
  • 4.2 M1-SharedPreferences (7:19)
  • 4.3 M1-Shared Preferences (3:40)
  • 4.4 M1 SQLITE (7:43)
  • 4.5 M1 SQLITE (3:27)
  • 4.6 Copy Paste Buffer (7:18)
  • 4.7 Copy Paste Code (1:46)
  • 4.8 Logging (5:11)
  • 4.9 Logging Code (2:08)
  • 4.10 Poor Authorization and Authentication (3:43)
  • 4.11 Broken Crypto (8:17)
  • 4.12 Client Side Injection-1 (3:30)
  • 4.13 Look at the code (2:59)
  • 4-14 Client Side Injection 2 (2:19)
  • 4-15 A look at the code (2:45)
  • 4-16 Improper Session Management (4:07)
  • 4-17 Reversing intro (2:17)
  • 4.18 APKTOOL (3:39)
  • 4.19 dex2jar (3:24)
  • 4.20 Finding Content URIs using APKTOOL (3:21)
  • Android Application Penetration Testing - Part 2

  • 5.1 Setting up drozer (5:05)
  • 5.2 Intent Spoofing (8:57)
  • 5.3 Content Provider Leakage (7:02)
  • 5.4 SQL Injection in Content Providers (9:54)
  • 6.1 A look at android exploit mitigatioin techniques (3:53)
  • 6.2 I m running ARM (2:46)
  • 6.3 GDB setup (6:30)
  • 6.4 Running a C program on your device (6:44)
  • 6.5 Format String Vulnerability (9:56)
  • 6.6 Transport Layer Security - SSL (7:22)
  • 7.1 Overview of Android forensics Forensics (9:32)
  • 7.2 SQLite data recovery (5:26)
  • iOS Application Penetration Testing - Part 1

  • 1-Course-Introduction (6:17)
  • 2-credits (3:01)
  • 3-introduction-to-ios (4:25)
  • 4-ios-app-basicsmp4 (4:03)
  • 5-ios-architecturemp4 (9:11)
  • 6-setting-up-xcode (7:47)
  • 7-adding-functionality-to-helloworld-app (10:00)
  • 8-Inbuilt-security-model (9:06)
  • 9-SECURITY CONTROLs (7:28)
  • 10-JAILBREAKING BASICS (7:42)
  • 11-INSTALLATIONS (18:24)
  • 12-INSTALLING CHALLANGE APPS (7:50)
  • 13-IOS APP DIRECTORY STRUCTURE (12:03)
  • 14-SQLITE DATA (10:52)
  • 15-PLIST FILES (6:06)
  • 16-NSUSER DEFAULTS (3:42)
  • 17-CORE-DATA (5:38)
  • 18-KEYCHAIN (9:14)
  • 19-LOGGING (4:20)
  • iOS Application Penetration Testing - Part 2

  • 20-APP BACKGROUNDING (6:02)
  • 21-KEYBOARD CACHE (3:27)
  • 22-PASTEBOARD (2:51)
  • 23-SQL INJECTION (4:52)
  • 24-CROSS-SITE SCRIPTING ATTACKS - XSS (5:14)
  • 25-INTERCEPTING HTTP TRAFFIC (8:59)
  • 26-INTERCEPTING HTTPS TRAFFIC (7:18)
  • 27-MONITORING NETWORK TRAFFIC(TCPIP) (6:17)
  • 28-DUMPING CLASS INFORMATION OF PREINSTALLED APPS (6:19)
  • 29-DUMPING CLASS INFORMATION OF APPS INSTALLED FROM APP STORE (8:51)
  • iOS Application Penetration Testing - Part 3

  • 31-RUNTIME CODE INJECTION USING CYCRIPT (5:13)
  • 30-CYCRIPT BASICS (13:50)
  • 32-ACCESSING AND MODIFYING VARIABLES USING CYCRIPT (6:36)
  • 33-EXPLOITING AUTHENTICATION USING CYCRIPT (6:36)
  • 34-METHOD SWIZZLING USING CYCRIPT (5:49)
  • 35-BYPASSING JAILBREAK DETECTION USING CYCRIPT (9:44)
  • 36-METHOD SWIZZLING USING SNOOP-IT (12:06)
  • 37-APP MONITORING USING SNOOP-IT (3:28)
  • 38-RUNTIME ANALYSIS WITH GDB (8:47)
  • 39-RUNTIME ANALYSIS USING SNOOP-IT (12:06)
  • 40-CYDIA DEFAULT PASSWORD EXPLOITATION WITH METASPLOIT (8:12)
  • 41-CRACKING OPENSSH PASSWORDS USING HYDRA (5:23)
  • 42-METASPLOIT BINDSHELL ON IDEVICES (7:47)
  • 43-METASPLOIT REVERSE SHELL IDEVICES (8:46)
  • 44-INTRODUCTION TO REVERSE ENGINEERING (8:49)
  • 45-REVERSING IOS APPS-1 (5:01)
  • 46-REVERSING IOS APPS-2 (6:48)
  • 47-REVERSING IOS APPS-3 (3:47)
  • 48-REVERSING IOS APPS-4 (5:19)
User Rating

4.8 average based on 491 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Student Reviews

Dont Miss Out Offer Ends In

  • Days
  • Hours
  • Minutes
  • Seconds

Professional Computer Hacker Certification Bundle Unleash the practical knowledge of hacking and Become Master Computer Hacker

$12

Course Features

  • 30-Day Money-Back Guarantee
  • Lessons With Examples
  • 5 Hours of Learning
  • Lifetime 24/7 Access
  • Completion Certificate