- Joined
- Jan 8, 2019
- Messages
- 56,610
- Solutions
- 2
- Reputation
- 32
- Reaction score
- 100,454
- Points
- 2,313
- Credits
- 32,620
6 Years of Service
76%

What you'll learn
- History of Android
- Android Ecosystem
- Android Architecture
- Android Software Stack
- Android Run time (ART)
- Analysis of APK file Structure in Android Studio
- Android's Security Model
- Application Sandboxing
- Permissions and Selinux
- Developer overview for Android apps
- Creating an Android virtual device
- Android Components
- Developing a basic android app
- Connect Emulator or real device and Kali
- Rooting Basics
- Reverse Engineering an APK file
- Information Gathering
- Repackaging and Resigning an APK
- Static Analysis with MobSF
- Root Detection
- Obfuscation Techniques
- OWASP Mobile Top 10 Vulnerabilities
- Android Pentesting on vulnerable mobile apps
Requirements
- 4 GB (Gigabytes) of RAM or higher (8 GB recommended)
- 64-bit system processor is mandatory
- 10 GB or more disk space
- Enable virtualization technology on BIOS settings, such as “Intel-VTx”
- All items referenced in this course are Free
- A strong desire to understand hacker tools and techniques
- A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
- Nothing else! It’s just you, your computer and your ambition to get started today
At the end of the course you will learn;
- History of Android
- Android Ecosystem
- Android Architecture
- Android Software Stack
- Android Run time
- Analysis of APK file Structure in Android Studio
- Android's Security Model
- Application Sandboxing
- Permissions and Selinux.
- Developer overview for Android apps
- Create an Android virtual device
- Android Components
- Developing a basic android app
- Connect Emulator or real device and Kali
- Rooting basics
- Reverse Engineering an APK file
- Information Gathering,
- Repackaging and Resigning an APK
- Static Analysis with MobSF
- Root Detection and Obfuscation Techniques.
- OWASP Mobile Top 10 Vulnerabilities
- Android Pentesting on vulnerable mobile apps
Code:
https://www.udemy.com/course/ethical-hacking-for-android-apps-and-devices
To see this hidden content, you must like this content.