Android Penetration Testing 101
- Description
- Curriculum
- FAQ
- Reviews
Android Penetration Testing 101 course is designed mainly for beginners who want to start their journey in android security but have no idea how to create and where to start.
This course gives you complete knowledge beginning from the android architecture to the analysis of the android application with all the attack vectors you learned.
In this course, we have demonstrated static analysis of android applications concerning all the frameworks( Reactnative, Java, flutter, Cordova) with the help of unique tools such as Jadx, Jeb decompiler, and GDA decompiler. Along with that, we have demonstrated automated scanners like MOBSF from installation to the dynamic analysis of the app. Also, we have discussed the common vulnerabilities that can be identified during the static analysis and the endpoints that we can look for.
The most exciting part of any Penetration testing is Dynamic analysis; In this course, we discussed why mobile applications need dynamic analysis and its role in hunting vulnerabilities. We have demonstrated setting up the lab for dynamic analysis( we preferred a burp suite with genymotion).
The primary concept in the dynamic analysis is SSL-PINNING; we have discussed all the ideas regarding SSL-pinning and demonstrated bypassing methods of SSL in android.
We have discussed excellent dynamic illustration tools like Frida and objection and demonstrated the setup.
In the end, we have performed live dynamic analysis on the android application and discussed common vulnerabilities that, can be identified during the dynamic analysis, the endpoints that we can look for, and how to find sensitive information in the app’s database.
To make your pentesting smoother, we provided an Android pentesting checklist, which might come in handy during your Real-time analysis.
-
4Android and its architectureVideo lesson
This Lecture gives the basic knowledge of android and its architecture.
-
5What are APK and its structure?Video lesson
This Lecture gives a basic understanding of the android apk and its structure.
-
6Android Components and LifeCycleVideo lesson
This Lecture gives basic information on Android components and Lifecycle methods.
-
7what are decompilation and decompilers?Video lesson
In this lecture, we can understand what is decompiling process and what are decompilers.
-
8what is Static Analysis? why is it important?Video lesson
Here we have discussed Static analysis and its Importance in Penetration Testing.
-
9Introduction to Static Analysis tools and their installations.Video lesson
we discuss the various static analysis tools and their installation procedure.
Jax: https://github.com/skylot/jadx/releases
JEB: https://www.pnfsoftware.com/jeb/community-edition
GDA: https://github.com/charles2gan/GDA-android-reversing-Tool/releases
-
10MOBSF: Installation and Introduction to MOBSF.Video lesson
In this lecture, we have discussed how to install MOBSF and how to use MOBSF, features of MOBSF, and also how to perform Dynamic analysis on android apk in MOBSF.
MOBSF: https://mobsf.github.io/docs/#/
-
11Common Vulnerabilities that can be found using static analysisVideo lesson
Here, we have discussed how to analyze the apk, we have shown static analysis of 3 different frameworks( Java, react, Cordova) and also discussed how to find weak codes and vulnerabilities.
-
12Static analysis with APK LeaksVideo lesson
Github : https://github.com/dwisiswant0/apkleaks
-
13Bonus: Automate the analysis of android componentsVideo lesson
Lets us automate the use of drozer to find vulnerabilities in android components.
Tool link: https://github.com/themalwarenews/drozscan
-
14what is the dynamic analysis and why is it important.Video lesson
In this video, we gonna discuss what is dynamic analysis and its importance.
-
15Dynamic Analysis Lab SetupVideo lesson
we will set up a dynamic analysis lab using burp suite and genymotion.
Burpsuite: https://portswigger.net/burp/releases/professional-community-2021-12-1?requestededition=community
Genymotion: https://www.genymotion.com/download/
Yaazhini:https://www.vegabird.com/yaazhini/
-
16what is SSL-PINNING, why is it important to integrate with the application?Video lesson
Let us understand what is SSL-PINNING, why developers implement it in the applications.
-
17Installation and Introduction to Frida and Frida-toolsVideo lesson
let us understand some dynamic illustration tools.
Frida: https://frida.re/docs/android/
Objection: https://github.com/sensepost/objection/wiki
Frida Universal SSL Bypass script : https://codeshare.frida.re/@pcipolloni/universal-android-ssl-pinning-bypass-with-frida/
Frida-server: https://github.com/frida/frida/releases
-
18Bypassing SSL-PINNING in 3 different ways.Video lesson
Here is the bonus video on other ways to bypass SSL-PINNING.
Apk-mitm: https://github.com/shroudedcode/apk-mitm
-
19Demonstration of Dynamic AnalysisVideo lesson
In this video, let us discuss attack vectors in dynamic analysis and the endpoints we can look into during dynamic analysis.
mlogcat: https://mlogcat.tistory.com/
-
20Bonus: Setting up Xposed frameworkVideo lesson
Configuring Xposed framework
Xposed Installer apk : https://forum.xda-developers.com/attachments/xposedinstaller_3-1-5-apk.4393082/
Xposed archive flash file : https://dl-xda.xposed.info/framework/sdk25/x86/xposed-v89-sdk25-x86.zip
Inspeckage : https://github.com/ac-pm/Inspeckage/releases
Xposed modules repo : https://repo.xposed.info/module
External Links May Contain Affiliate Links read more