0% found this document useful (0 votes)
27 views6 pages

Training & Program: Enroll Now

This document provides information about an Android penetration testing training course offered by Ignite Technologies. The course is 25-30 hours and covers topics like Android architecture, permissions, static and dynamic application testing, insecure data storage, traffic analysis, and automated analysis tools. Successful students will gain skills to assess Android application security and find vulnerabilities like insecure data leakage and client-side injections. Ignite Technologies offers professional cybersecurity training courses ranging from beginner to advanced levels.

Uploaded by

muhammadamir1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views6 pages

Training & Program: Enroll Now

This document provides information about an Android penetration testing training course offered by Ignite Technologies. The course is 25-30 hours and covers topics like Android architecture, permissions, static and dynamic application testing, insecure data storage, traffic analysis, and automated analysis tools. Successful students will gain skills to assess Android application security and find vulnerabilities like insecure data leakage and client-side injections. Ignite Technologies offers professional cybersecurity training courses ranging from beginner to advanced levels.

Uploaded by

muhammadamir1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

TRAINING & PROGRAM

Enroll Now

ANDROID
PENTESTING
POWERED BY IGNITE TECHNOLOGIES

www.ignitetechnologies.in
+91 959 938 7841
In this modern world where our main concern is privacy and protection, we
know in our hands that we have the greatest assets and the greatest threat.
Yes, we're talking about the smartphone, Now phone isn't just a tool to call
somebody it has become a part of life. Mobile phones now have more
personal information, such as banking & social identity numbers, etc and
people don't know to how to protect, because of this company's are hiring
security engineers who knows mobile application security.
The strongest part of this course that it includes code-level security means you
will understand the working of codes from there you can determine what
attacks can be formed on the application by that you can even mitigate attacks
like Instagram_RCE.

WHAT WE ARE GOING TO LEARN

Android
Basic Application
Understanding Dynamic
& Lab Setup Testing

Android Android
Application Application
Static Web & API
Testing Testing

COURSE DURATION: 25 to 30 HOURS


Why to choose Ignite Technologies?
Ignite believes in “Simple Training makes Deep Learning” which help us in
Leading International CTF market.
• Ignite Technologies is leading Institute which provides Cyber Security training
from Beginner to Advance as mention below:
1. Networking
2. Ethical hacking
3. Bug Bounty
4. Burp Suite for Pentester
5. Windows for Pentester
6. Linux for Pentester
7. Computer Forensic
8. CTF-2.0
9. Privilege Escalation
10. Red Team Operations
11. Infrastructure Penetration Testing
12. API Penetration Testing
13. Android Penetration Testing
• World RANK -1st, in Publishing more than 400 walkthroughs (Solution) of CTFs
of the various platform on our reputed website “www.hackingarticles.in”.
• We Provide Professional training that includes real-world challenges.
• Ignite’s Students are placed in a TOP reputed company in the overworld.
• Hands-on Practice with 80% Practical and 20% Professional Documentation.
• ONLINE classes are available

Career in IT Security Domain:

Chief Information Security Officer Incident Analyst | Responder Information Security Analyst
Senior Security Consultant Software code Analyst Digital Forensic Expert
Cryptographer Risk Controller International Trainer
Penetration Tester Security Architect Security Engineer
Researcher Exploit Developer Ethical Hacker

www.ignitetechnologies.in
+91 959 938 7841
COURSE OVERVIEW
UNIT-1: INTRODUCTION
1. Android Architecture
2. Android Permissions
3. Android Application Package
4. Android Compilation and Decomplication
5. Android Pentest Lab Setup
6. ADB
7. Insecure logging
8. SQLite DBs
9. Drozer Introduction
10. OWASP TOP 10

UNIT-2: STATIC ANALYSIS


1. Improper Platform Usage
2. Insecure Data Storage
3. Broken Cryptography (through decompilation)

www.ignitetechnologies.in
+91 959 938 7841
4. Code Analysis
5. Reverse Engineering and Frida

UNIT-3: DYNAMIC ANALYSIS


1. Unintended Data Leakage:
a. Copy Paste Buffer
b. Crash Logs Analysis
c. Analytics Data Analysis
2. Hooking to snoop sensitive data including
Crypto APIs
3. Objection and XPosed framework -
Automated Hooking
4. Root Detection Bypass and prevention
5. Traffic Analysis
6. Insufficient Transport Layer Protection
a. Lack of Certificate Inspection
b. Weak Handshake Negotiation
c. Privacy Information Leakage
7. SSLPinning and Unpinning/MiTM attacks
8. Android Debugging Based Vulnerabilities

www.ignitetechnologies.in
+91 959 938 7841
9. Crafting malicious APKs to exploit:
a. Activities
b. Services
c. Content Providers
d. Broadcast Receivers
e. Android DeepLinks and Exploitation
10. Client-Side Injections:
a. SQLi
b. XSS
c. LFI
e. Eternal Cookies
11. Android WebViews and Exploitation

UNIT-4: AUTOMATED ANALYSIS


1. MobSF
2. QARK
3. Xposed framework
4. Objection 2.0

www.ignitetechnologies.in
+91 959 938 7841

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy