Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Udemy - Android Hacking And Penetration Testing [repost]

Posted By: house23
Udemy - Android Hacking And Penetration Testing [repost]

Udemy - Android Hacking And Penetration Testing
MP4 | AVC 528kbps | English | 1280x720 | 30fps | 7h 50mins | AAC stereo 69kbps | 2.06 GB
Genre: Video Training

Android Hacking and Penetration Testing course is a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, You will learn various topics such as Android architecture, Android security model, Android Application Pentesting and Exploitation, Reversing Android applications, static and dynamic analysis of android malware etc. After finishing this course you will be able to perform a Penetration test on a given Android device and its applications.

By the end of the course , You will learn How to Fuzz applications
By the end of the course, students will be able to understand the internals of android and it's security
They will be able to pentest android apps in an efficient way
By the end of the course, you will learn how to carryout man in the middle attacks in real world
They will be in a position to perform real world attacks on Android Devices and Apps
By the end of the course , You will undertsand the internals of Android App Reversing and Malware Analysis

Content:
├── 01-Introduction To The Course.mp4
├── 03-Course Instructions.mp4
├── 04-Need For Mobile Security And Owasp Top 10 Mobile Risks.mp4
├── 05-Lab Setup.mp4
├── 06-Installing Ubuntu On VMware.mp4
├── 07-Setting Up An Android Pen-testing Environment on Ubuntu.mp4
├── 08-Eclipse IDE.mp4
├── 09-Android Debug Bridge.mp4
├── 12-Android's Architecture.mp4
├── 13-Android Data Structures and File Systems.mp4
├── 14-Android Apps.mp4
├── 15-Android Security Model.mp4
├── 16-Android Permissions.mp4
├── 17-Google Bouncer.mp4
├── 18-Difference Between Android Emulator & Android Device.mp4
├── 19-Interacting With Android device Via Usb.mp4
├── 20-All About Rooting.mp4
├── 21-SSH.mp4
├── 22-VNC.mp4
├── 23-Busy Box.mp4
├── 24-Setting Up A Proxy for Android Emulator.mp4
├── 25-Setting Up A Proxy for Android Device.mp4
├── 26-Installing CA certificate.mp4
├── 27-Real World MITM and SSL MITM Attacks Part-1.mp4
├── 28-Real World MITM and SSL MITM Attacks Part -2.mp4
├── 29-Data Manipulation.mp4
├── 30-Apk files in a nutshell.mp4
├── 31-Introduction to Reverse Engineering.mp4
├── 32-Reversing to get Source Code of Android Apps.mp4
├── 33-Reverse Engineering with APKTOOL.mp4
├── 34-Introduction to Android Malwares.mp4
├── 35-Dynamic Vs Static Analysis.mp4
├── 36-Static analysis of Android Malwares.mp4
├── 37-Dynamic analysis of Android Malwares.mp4
├── 38-Introduction to Android Tamer.mp4
├── 39-Dynamic Analysis with DroidBox.mp4
├── 40-Installing JSinfosec Vulnerable Apps.mp4
├── 41-Introduction to Android App pentesting.mp4
├── 42-Fuzzing Android Apps with Burp - Proxy.mp4
├── 43-Fuzzing Android Apps with Burp - Intruder.mp4
├── 44-Attacking Authentication.mp4
├── 45-Content Provider Leakage.mp4
├── 46-Client Side Injection.mp4
├── 47-Insecure Data Storage - Shared Preferences.mp4
├── 48-Insecure Data Storage - SQLite Databases.mp4
├── 49-Unintended Data Leakage.mp4
├── 50-Broken Cryptography.mp4
├── 51-Automated Security Assessments with Drozer.mp4
├── 52-Exploiting Android Devices Using Metasploit.mp4
├── 53-Android Device Protection.mp4
├── 54-Bypassing Android Locks.mp4
├── 55-Android Data Extraction.mp4
├── 57-PWN Pad on Nexus 7.mp4
├── 58-Kali Linux on Android.mp4
├── 60-Android Security Practices.mp4
├── 61-Course Summary And Revision.mp4
└── 62-Conclusion.mp4

Udemy - Android Hacking And Penetration Testing [repost]

Udemy - Android Hacking And Penetration Testing [repost]

Udemy - Android Hacking And Penetration Testing [repost]


No mirrors please