Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Mobile Application Penetration Testing
Module 1 - Android Application Penetration Testing - INTRODUCTION
Introduction to Android (4:23)
Android architecture (7:36)
Software Installations (7:04)
Setting up the test bed - Creating an emulator (4:22)
Module 2- Android Security Model
Android Security Model & Linux Kernel (6:50)
App Sandboxing (8:00)
Secure Inter process Communication (10:15)
Application Signing (8:16)
App Permissions (7:25)
Modul 3: App Development Basics
Understanding Android app Structure (6:43)
Building a simple app (11:29)
Security Assessments of Android Apps – OWASP TOP 10
Introduction (2:52)
M2 – Insecure Data Storage - SHARED PREFERENCES (7:17)
M2 – Insecure Data Storage - SHARED PREFERENCES -- Look at Code (3:39)
M2 – Insecure Data Storage - SHARED PREFERENCES -SQlite Databases (7:41)
M2 – Insecure Data Storage - SQlite Databases -- Look at Code (3:26)
M3 – Insufficient Transport layer protection --- Introduction and HTTP traffic interception (9:41)
M3 – Insufficient Transport layer protection --- Intercepting HTTPS traffic (7:20)
M3 – Insufficient Transport layer protection --- The Coffee shop attack (10:13)
M3 – Insufficient Transport layer protection ---Passive analysis with tcpdump & Wireshark (7:38)
M4 – Unintended Data Leakage -- Reading the clipboard (7:16)
M4 – Unintended Data Leakage -- Reading the clipboard - Look at Code (1:45)
M4 – Unintended Data Leakage --Logging (5:09)
M4 – Unintended Data Leakage --Logging -- Look at Code (2:07)
M5 –Poor Authorization and Authentication (3:42)
M6 – Broken Cryptography (8:15)
M7 – Client Side Attack-- SQL Injection at Client Side (3:29)
M7 - SQL INJECTION -- LOOK AT CODE (2:58)
M7 - frame injection in webviews (2:18)
M7 - frame injection in webviews -- Look at Code (2:44)
M8 – Security Decisions via untrusted inputs -- Intent Spoofing (5:08)
M9 – Improper Session Handling (4:05)
M10 – Lack of binary protection -- Introduction (2:16)
M10 - Reversing android apps with APKTOOL (3:38)
M10 - Reversing android apps with dex2jar & JD-GUI (3:23)
M10 - Finding Content Provider URIs using APKTOOL. (3:20)
Module 1: Getting Started
Course Introduction (6:15)
Introduction to iOS (4:23)
iOS App Basics (4:01)
iOS Architecture (9:09)
Setting up Xcode (7:45)
Adding functionality to our “helloworld” app (9:58)
Module 2 - iOS Security Model
1. Inbuilt Security Model (9:04)
Enabling and checking for inbuilt security controls in iOS apps (7:26)
Module 3 - Setting up an iOS PenTesting Lab
Jailbreaking basics (7:40)
Installing required tools in iDevice (18:22)
Module 4 - Penetration Testing iOS Apps -- Insecure Local Data Storage
Installing challenge Apps (7:48)
iOS App Directory Structure (12:01)
SQLite Data (10:50)
plist files (6:04)
NSUserDefaults (3:41)
Core Data (5:36)
keychain (9:12)
Module 5 - Penetration Testing iOS Apps -- Unintended Data Leakage
Logging (4:18)
App Backgrounding (6:01)
keyboard Cache (3:26)
Pasteboard (2:50)
Module 6 - Penetration Testing iOS Apps -- Client Side Injection
SQL Injection (4:50)
Cross-Site Scripting Attacks - XSS (5:12)
Module 7 - Traffic Analysis
Intercepting HTTP Traffic (8:57)
Intercepting HTTP'S' Traffic (7:16)
Monitoring network traffic(TCP/IP) (6:15)
Module 8 - Runtime Analysis
Dumping class information of preinstalled apps (6:17)
Dumping class information of apps installed from App Store (8:49)
Cycript Basics (13:48)
Runtime Code Injection using Cycript (5:11)
Accessing and modifying variables using Cycript (6:34)
Exploiting authentication using Cycript (6:34)
Method Swizzling using Cycript (5:47)
Bypassing Jailbreak detection using Cycript (9:42)
Method Swizzling using Snoop-it (12:04)
App Monitering Using SNOOP-IT (3:27)
Runtime analysis with GDB (8:45)
Runtime Analysis with SNOOP-IT (12:04)
Module 9- Network Attacks
Cydia Default password exploitation with Metasploit (8:10)
Cracking OpenSSH passwords using Hydra (5:21)
Metasploit bindshell on iDevices (7:45)
Metasploit Reverseshell on iDevices (8:44)
Module 10: Reverse Engineering
Introduction to Reverse Engineering (8:47)
Reversing iOS Apps - Video 1 (4:59)
Reversing iOS Apps - Video 2 (6:46)
Reversing iOS Apps - Video 3 (3:46)
Reversing iOS Apps - Video 4 (5:17)
Teach online with
M10 - Reversing android apps with APKTOOL
Back to Home
|
My Courses
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock