Hacking Android Applications for Bug Bounty and Pentesting
Size: 2.07 GB

This course is designed to help you kick-start the journey of android pentesting with right tools and methodology. Information security is the ever-changing field, we bring the latest methodology to setup your own environment and get your hands dirty with the android pentesting.

This course initiates with basics such as Android Architecture, what is Android Run time (ART), Android device Rooting Basics. Towards the intermediate concepts like Reversing Android Apps, Bypassing client side restrictions such as root detection, SSL Pinning etc. This course leverages multiple industry known & open source applications to demonstrate the test cases.

This course will also teaches you how to identify a variety of Android App vulnerabilities such as Insecure Data Storage, Insecure Logging, Weak Jailbreak detection, insecure end to end encryption, Access Control issues in REST API etc.

Essentially this course is designed to teach the general approach right from reversing the APK, to understand & identify vulnerabilities,  modifying the application logic to run the modified application in the android environment.

Who this course is for:

  • Beginner bug bounty hunter who wants to learn Android security
  • Security enthusiasts who wants to learn about Android security

What you’ll learn

  • Android Ethical Hacking
  • Android Hacking
  • Fundamentals of Android
  • Android Lab & Device setup for Testing
  • Basics of Android Pentesting
  • Advanced Android Pentesting
  • History of Android
  • Android Ecosystem
  • Application Sandboxing
  • Android Components
  • Analysis of APK file Structure
  • Rooting Basics
  • Root Detection Bypass
  • SSL Pinning Bypass
  • Android Static Analysis with MobSF
  • Android Dynamic Analysis
  • Real World Reports Walkthrough
  • Android Bug Bounty

HOMEPAGE – https://www.udemy.com/course/hacking-android-applications-for-bug-bounty-and-pentesting/

Free Download Links-

Note: Comment below if you find the download links dead.


Leave a Reply

Your email address will not be published. Required fields are marked *