
Certified Mobile Penetration Tester – Android
Mobile devices have become an integral part of our lives. A recent report on smartphone usage in the first quarter of 2021 indicates that Android is the most widely used smartphone OS— capturing a share of around 71 percent in the global market. Android mobile application security is a prime concern for the users and hence spiking the demand for penetration testers.
Why Penetration Testing In Android?
RedTeam designed the course Certified Mobile Application Penetration Tester (Android ) after much research on the necessity of a penetration tester in a technologically developed society. And RTHA has a beginner-friendly course scheme that will be the best contribution to our learners future in
This link is hidden for visitors. Please Log in or register now.
Cybersecurity Community Tech Support & Social Forums
Become a part of exclusive Cybersecurity Community Tech Support & Social Forums while enrolling on this courseLearn The Future Skill
From setting up a professional environment for identifying vulnerabilities to implementing pentesting tools like Burp Suite and Wireshark, our penetration testing training for Android applications illustrates every aspect of penetration testing and APK reverse engineering.Introduction to Course
This link is hidden for visitors. Please Log in or register now.
Course Content
- Course Overview
- Introduction of Mobile App
- Android Architecture
- Android Security Architecture and Permission Model
- Android Application Component
- Installing Virtual Box
- Installing SONTOKU OS
- Installing Genymotion
- Android Debug Bridge
- Configuration of Burpsuite and Wireshark
- Application Reverse Engineering using apktool, jd-gui etc
- Analysing Dex file
- Analysing traffic using Burpsuite and Wireshark
- Owasp top 10 Vulnerabilities
- Installing DIVA (Damn Insecure And Vulnerable App)
- SSL Pinning
- Insecure Logging attack
- Hardcoding issue
- Insecure Data Storage
- Database Insecure Storage
- Temporary file insecure storage
- External Insecure Data Storage
- SQL injection in android
- Web View Vulnerability Exploitation
- Access Control issue
- Authentication Based Access Control issue
- Leaking Content Provider
- Hard coding issue using JNI (Java Nativev interface)
- Web Log Introduction And Format
- Web Server Log Analyzer Demo