In order to protect yourself from hackers, you must think as one.
Android Hacking and Penetration Testing course is a hands-on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. Android, the Google operating system that’s on 80% of the world’s smartphones. In extreme cases, hackers with malicious intent can do much more than send premium text messages. In this video you will learn how to hack Android applications.
To completely understand computer security, it's vital to step outside the fence and to think outside the box. Computer security is not just about firewalls, Intrusion Prevention Systems or antiviruses. It's also about tricking people into doing whatever a hacker wishes, for their benefit. A secure system, network or infrastructure is also about informed people. That's it what about this course is all about. Knowing how easy is for a hacker to make a regular user to do something harmful for himself, even being aware that is making a bit mistake.
This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided.
Below are the main topics, both theoretical and practical, of this course:
- Core problems (Causes. Defences)
- Web Technologies (HTTP Protocol, Web Functionality, Encoding)
- Mapping (Spidering and Analysing)
- Attacking Authentication (Technologies, Flaws, Fixes, Brute Force)
- Attacking Session Management (State, Tokens, Flaws)
- Attacking Access Controls (Common Vulnerabilities, Attacks)
- Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation)
- Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)
- Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)
- Attacking Application Logic
- Cross Site Scripting
- Attacking Users (CSRF, ClickJacking, HTML Injection)
- Spidering, Website Analyser
- Session Hijacking via Mann-in-The-Middle
- Get Gmail or Facebook Passwords via SSLStrip
- SQL Injection
- Upload File and Remote Execution
- Cross-Site Scripting (Stored + Reflected, Preventing XSS)
- CSRF (Change password trough CSRF vuln., Preventing CSRF)
- Introduction to Ethical Hacking, Footprinting and Reconnaissance
- Scanning Networks, Enumeration and Vulnerabilities
- System Hacking
- Trojans, Backdoors, Viruses and Worms
- Penetration testing on Wireless Networks
- Penetration Testing
- Social Engineering
- Android application Pentesting
Watch the free previews below!