Android Mobile application hacking 3-day hands on- syllabus v2
Recommend Documents
Hacking. 4-Day Hands-On Course. Course description. This course will focus on
the techniques and tools for testing the security of Android and iPhone.
techniques and culture of ethical hacking. CURITY ... hacking techniques, this is
always done with defence in ... A basic understanding of TCP/IP networking, e.g..
Targets (a mix of Windows and Linux servers and workstations). • Remote ... „
Network Takeover” scenario with Kali Linux and Armitage - a whole day hands-
on.
Android is a software stack for mobile devices, such as smartphones and tablet
computers. ○ It is developed by the Open Handset Alliance led by Google.
In this article we'll look how we can proceed for Android Mobile application testing. ... 10. After doing the changes run that modified compiled code and check ...
Agenda. • Android OS Basics. • Inside the APK. • Android Security Model. •
Reversing the codes. • Some case studies. • Making our own malware. • Malware
= ...
Dec 12, 2012 ... 2012/12/12. Pag. 2 whitone CorsoAvanzatoLinux
2012. What is Android? A mobile-centric Linux distro.
Android vs Windows Phone vs iOS vs Firefox OS. Tor-Morten Grønli. Norwegian .... of Hall and Anderson [10], who compared the Android and. iPhone operating ...
Android Application is an open source and Linux-based operating system for mobile devices such as smartphones and Tablet computers. Due to the Evaluation of digital world and increasing in the use of Android Phone.
Nov 1, 2012 ... XOOM and Galaxy: Added support for Android 4.0. 1.0.3 ... Galaxy Tab 8.9” SHV-
E140S ... the settings automatically, or enter settings manually.
Mar 20, 2016 - Keywords: hereditary diseases; android application; medical practitioners; .... Playstore of Google Android [10], Apple itunes of Apple [25], ...
Android, GPS, Mobile maps, Radar, Smart Phone application. 1. .... access the Internet within 5 years and the number of mobile devices will be over 10 times the.
1. Google Maps Android API V2. Google Maps. Early Android mapping was done
with Google Maps Android API V1 and the. MapView control. This approach is ...
Android Syllabus. 1. History ... Eclipse. 3.6. Android Development Kit ... 10. Styles And Themes. 10.1. Creating Style. 10.2. Style As a Theme. 10.3. Inheritance.
Text: The Busy Coder's Guide to Android Development. Murphy, Mark.
Commonsware. 2012. Android Programming Tutorials. Murphy, Mark.
Commonsware.
Web Telnet: Something fun for WebDav Uploads. • Bad Extension source
disclosures. • Managing web app sec. •. Contributing factors to the problem.
Download Best Book Hands-On Ethical Hacking and Network Defense, PDF Download Hands-On Ethical ... Publisher : Delmar Ce
... is a global leader in InfoSec Cyber Security certification programs like Certified ... titles focusing Do not try th
Defense Full Online. Hands-On Ethical Hacking and Network Defense Free Download, PDF Hands-On Ethical Hacking and Networ
PDF Download Hands On Ethical Hacking And Network Defense Full Online, epub free ... download, Hands On Ethical Hacking
The Super Sized Ethical Hacking Bundle Secure Your Own Network amp ... News analysis and research for business technolog
The text then provides an in-depth guide to performing security testing against computer networks, covering current tool
C E H v 9 C e r t i f i e d E t h i c a l H a c k e r V e r s i o n 9 S t u d y G u i d e 3 r d ... Network Defense Free
Android Mobile application hacking 3-day hands on- syllabus v2
Android mobile application hacking. 3-day hands on course. Course description.
This course will focus on the techniques and tools for testing the security of ...
Android mobile application hacking 3-day hands on course Course description This course will focus on the techniques and tools for testing the security of Android mobile applications. During this course the students will learn about important topics such as the Android Security model, the emulator, how to perform static analysis, traffic manipulation, and dynamic analysis. By taking this course you will be able to perform penetration testing on Android mobile applications and expose potential vulnerabilities in the tested application. The objectives of the course are: Understand the Android application threat landscape Perform penetration testing on android mobile apps Identify vulnerabilities and exploit them Operate AppSec Labs' unique AppUse customized VM for android pen-testing
Target audience Members of the security / software development team: Security penetration testers Android developers
Prerequisites Before attending this course, students should be familiar with: Common security concepts Java background and basic knowledge of the Android development platform Basic knowledge of the Linux OS
Hardware/Software requirements Please make sure that each machine has: At least 2GB of RAM (4GB is highly recommended) 15GB of free HD space VMware player (free) or VMware workstation (commercial) Wireless connectivity in the class – a dedicated router accessible from the class' network Android device & cables – optional
Course topics Day 1 Introduction to Android security Mobile application threat model - What makes mobile application security so different? The Android linux OS security The Dalvik VM The Android security mechanisms Application file system isolation & insecure file access The permission model Database isolation The Android emulator VS. physical device The debug bridge Rooting AppUse VM Lab - Android Emulator, ADB and Database Isolation Lab - build your own malware app and steal other app files
Static analysis - Reverse engineering & patching the application binaries The APK file package APK extraction - Investigating layout, manifest, permissions and binaries Extracting the content of the classes.dex file Using smali/baksmali Dalvik assembler/disassembler Decompilation Using dex2jar Reverse engineer the app and change its behavior Decompile / disassmble the dex classes using smali/baksmali Code patching - Modifying the code Recompile Resign the APK Lab - Recovering protected secrets Lab - Application patching
Day 2
Application dynamic runtime analysis Monitoring process activity Observing file access Monitoring network connectivity Analyzing logs using logcat Memory dumps and analysis Smali Debugging Setting breakpoints Native debugging with IDA (building signatures, types etc.) Runtime instrumentation and manipulation using ReFrameworker Lab - Memory dumps and objects analysis Lab - Smali Debugging
Traffic analysis and manipulation Common vulnerabilities related to traffic Proxies and sniffers Sensitive information transmission Importing SSL certificates & trusted CA's Bypassing server certificate validations Exposing insecure traffic Validating server certificates and avoiding man-in-the-middle SSL Pinning Using the HostnameVerifier class Using SSL with the HttpsURLConnection class Client side certificate authentication Lab - Parameter Manipulation Lab - Bypassing SSL Pinning
Day 3 Component & IPC security Major component types – Activity, Service, Content provider, Broadcast receiver
The intent structure The intent filter Component permissions and visibility Authenticating Callers of Components Binder interface Pending intents Direct component invocation by unauthorized apps