Android and iPhone Mobile Application Hacking 4-Day Hands-On ...

23 downloads 5639 Views 206KB Size Report
Hacking. 4-Day Hands-On Course. Course description. This course will focus on the techniques and tools for testing the security of Android and iPhone.
Mobile Application Hacking for Android and iPhone 4-Day Hands-On Course Syllabus

Android and iPhone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques and tools for testing the security of Android and iPhone mobile applications. During this course the students will learn about important topics such as the Android and iPhone Security model, the emulator, how to perform static analysis, traffic manipulation, and dynamic analysis. By taking this course you will be able to perform penetration testing on Android mobile applications and expose potential vulnerabilities in the tested application. The objectives of the course are: Understand the Android and iPhone application threat landscape Perform penetration testing on Android and iPhone mobile apps Identify vulnerabilities and exploit them Operate AppSec Labs' unique AppUse customized VM for Android pen-testing

Target audience Members of the security / software development team: Security penetration testers Android developers iPhone / iOS developers

Prerequisites Before attending this course, students should be familiar with: Common security concepts Java background and basic knowledge of the Android development platform C/C++ background Basic knowledge of the iOS development platform In addition, participants must bring iPhone or iPad devices to the course.

1|P age

Course topics Day 1 Introduction to Android Security Top issues facing mobile apps What makes mobile security so different? Mobile malware The Android Linux OS security The Android security mechanisms Application file system isolation Database isolation The permission model LAB: Exploring the Android environment The Android Penetration Testing Workspace The Android emulator Emulator VS. device testing The debug bridge LAB: The Android emulator Tools of the trade Using AppUse ("Android Pen-test Platform Unified Standalone Environment") VM LAB: AppUse feature walkthrough Android Application Static Analysis The APK file package Extracting file content Investigating layout, manifest, permissions and binaries Analyzing file system access LAB: Locating secrets in code & configuration files Investigating database & storage usage Identifying local SQL Injections in SQLite LAB: Binary decompilation & disassembly

2|P age

Day 2 Application Dynamic Analysis Debugging Setting breakpoints LAB: Manipulating client side UI controls LAB: Bypassing authorization restrictions Memory analysis Memory dumps Patching & Binary modifications LAB: Reverse engineering target applications Traffic Manipulation Remote Authentication Traffic interception Using proxies Bypassing server certificate validations LAB: Importing SSL certificates & trusted CA's Exposing insecure traffic LAB: Traffic manipulation using the AppUse VM

3|P age

Day 3 Introduction to iPhone Security Top issues facing mobile apps What makes mobile security so different? Mobile malware iPhone OS security built-in iOS security mechanisms Application file system isolation Database isolation The permission model LAB: Exploring the iPhone environment The iPhone Penetration Testing Workspace The iOS emulator Simulator VS. device testing Jailbreaking the iPhone – enabling advanced features for PT purposes Command line remote access Tools of the trade LAB: working with the simulator vs. real device Application Static Analysis The file package Extracting file content Investigating binary content Data storage locations Analyzing file system access LAB: Locating secrets in code & configuration files Investigating database & storage usage Identifying local SQL Injections in SQLite LAB: Binary decompilation & disassembly

4|P age

Day 4 Application Dynamic Analysis Debugging Setting breakpoints LAB: Manipulating client side UI controls LAB: Bypassing authorization restrictions Memory analysis Memory dumps Decrypting applications content Patching & Binary modifications LAB: Reverse engineering target applications Traffic Manipulation Remote Authentication Traffic interception Using proxies Bypassing server certificate validations LAB: Importing SSL certificates & trusted CA's Exposing insecure traffic LAB: Traffic manipulation

5|P age

Suggest Documents