Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Android Application Penetration Testing Course
Module 1:Introduction to Android
1.1 Introduction to Android (4:23)
1.2 Android architecture (7:36)
1.3 Software Installation (7:04)
1.4 Creating an emulator (4:22)
2. Module-Android Security Model
2.1 Android Security Model (6:50)
2.2 App Sandboxing (8:00)
2.3 Secure Interprocess Communication (10:15)
2.4 Application Signing (8:16)
2.5 App Permissions (7:25)
3. Module-App Development Basics
3.1 App Structure (6:43)
3.2 Building a simple app (11:29)
4. Module-Security Assessments of Android Apps – OWASP TOP 10
M1 Introduction (2:52)
M2 – Insecure Data Storage - SHARED PREFERENCES (7:17)
M2 – Insecure Data Storage - SHARED PREFERENCES -- Look at Code (3:39)
M2 – Insecure Data Storage - SQlite Databases (7:41)
M2 – Insecure Data Storage -SQlite DB LOOK at Code (3:26)
M3 Insufficient Transport layer protection --- Introduction and HTTP traffic interception (9:41)
M3 Insufficient Transport layer protection --- Intercepting HTTPS traffic (7:20)
M3 – Insufficient Transport layer protection --- The Coffee shop attack (10:13)
M3 – Insufficient Transport layer protection ---Passive analysis with tcpdump & Wireshark (7:38)
M4 – Unintended Data Leakage -- Reading the clipboard (7:16)
M4 – Unintended Data Leakage -- Reading the clipboard - Look at Code (1:45)
M4 – Unintended Data Leakage --Logging (5:09)
M4 – Unintended Data Leakage --Logging -- Look at Code (2:07)
M5 –Poor Authorization and Authentication (3:42)
M6 – Broken Cryptography (8:15)
M7 – Client Side Attack-- SQL Injection at Client Side (3:29)
M7 - SQL INJECTION -- LOOK AT CODE (2:58)
M7 - frame injection in webviews (2:18)
M7 - frame injection in webviews -- Look at Code (2:44)
M8 – Security Decisions via untrusted inputs -- Intent Spoofing (5:08)
M9 – Improper Session Handling (4:05)
M10 – Lack of binary protection -- Introduction (2:16)
M10 - Reversing android apps with APKTOOL (3:38)
M10 - Reversing android apps with dex2jar & JD-GUI (3:23)
M10 - Finding Content Provider URIs using APKTOOL. (3:20)
5. Module-Automated Security Assessments with Drozer
5.1 Setting up drozer (5:03)
5.2 Intent Spoofing (8:55)
5.3 Content Provider Leakage (7:00)
5.4 SQL Injection in Content Providers (9:52)
6. Module-Native Exploitation
6.1 A look at android exploit mitigatioin techniques (3:52)
6.2 I m running ARM (2:45)
6.3 GDB setup (6:28)
6.4 Running a C program on your device (6:42)
6.5 Format String Vulnerability (9:54)
7. Module-Introduction to Android Forensics
7.1 Overview of Android forensics Forensics (9:30)
7.2 SQLite data recovery (5:24)
Teach online with
6.4 Running a C program on your device
Back to Home
|
My Courses
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock