Social Media Icons

Android Pentesting Course

Master the art of mobile app security! Dive deep into advanced techniques for identifying, exploiting, and securing vulnerabilities in Android applications with our Android Pentesting Course. Join now to level up your expertise!

$99.00 $199.00 50% OFF

View Syllabus

Course Overview

Welcome to the Android Pentesting course! This course is designed to give you a comprehensive understanding of Android security and the skills needed to identify and exploit vulnerabilities in Android applications.

Whether you're looking to pursue a career in penetration testing, mobile security research, or ethical hacking, this course will equip you with the hands-on techniques needed for effective mobile security assessments.

The course covers topics such as:
  • Introduction to Android architecture, permissions, and security models
  • Setting up a penetration testing environment with essential tools like Genymotion, Burp Suite, MobSF, and more
  • Static and dynamic analysis of Android applications
  • Rooting and bypassing root detection mechanisms
  • Exploiting vulnerabilities in Android apps, including OWASP Top 10 and insecure data storage
  • Hands-on practical exercises to test your skills on vulnerable mobile apps

By combining theoretical lessons with practical labs, this course ensures you gain both the knowledge and the hands-on experience to become proficient in Android penetration testing.

Who Should Take This Course?

  • Individuals looking to break into the field of mobile security testing.
  • Those interested in expanding their skills to Android app security and mobile pentesting.
  • Hackers who want to learn how to assess the security of Android apps and devices.
  • Individuals researching mobile vulnerabilities and exploitation techniques in Android environments.
  • Developers interested in understanding Android security issues to secure their own apps.

Course Curriculum

Android Pentesting Course

7 Exercises104 Learning Materials

Module 1: Course Introduction

Course Introduction

Video
00:01:57

Disclaimer

Video
00:01:28

Tips & Tricks

Video
00:01:23

Module 2: Android Application Internals

Introduction

Video
00:00:43

Android Architecture

Video
00:12:38

Android Permissions

Video
00:03:12

Android Application Package

Video
00:05:04

Android Compilation and Decomplication

Video
00:03:05

Android Debug Bridge (ADB)

Video
00:02:47

Summary

PDF

Technical References

PDF

Quiz

Exercise

Conclusion

Video
00:00:26

Module 3: Lab Setup

Introduction

Video
00:00:37

Android Pentest Lab Setup

Video
00:01:14

Genymotion Installation

Video
00:02:12

Android Studio Installation

Video
00:02:11

MobSF

Video
00:01:34

APK Tool

Video
00:02:43

Frida

Video
00:01:16

Drozer

Video
00:03:16

Jadx

Video
00:01:38

Burp Suite

Video
00:01:41

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
00:00:20

Module 4: Rooting Basics

Introduction

Video
00:00:31

Rooting

Video
00:02:07

Root Detection Bypass and prevention

Video
00:04:38

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
00:00:21

Module 5: Static Analysis

Introduction

Video
00:00:36

Introduction to Static Analysis

Video
00:01:26

Decompiling APK file

Video
00:01:15

Manual Decompilation

Video
00:01:46

Decompiling using APK Tool

Video
00:01:15

Decompiling using MobSF

Video
00:00:30

Reverse Engineering

Video
00:05:12

Reverse Engineering using APK Tool

Video
00:01:05

Reverse Engineering using Jadx

Video
00:02:41

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
00:00:20

Module 6: Dynamic Analysis

Introduction

Video
00:00:34

Introduction to Dynamic Analysis

Video
00:02:18

Exploiting Vulnerable Components

Video
00:01:33

Traffic Analysis

Video
00:02:55

SSL Pinning Bypass (Demo)

Video
00:04:30

Finding Attack Surface

Video
00:04:00

Exploiting Insecure Service

Video
00:01:28

Exploiting Content Providers

Video
00:01:26

Burp Suite Certificate on an Emulator

Video
00:01:35

Intercept Traffic using Burp Suite

Video
00:01:35

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
00:00:19

Module 7: OWASP Mobile Top 10 Vulnerabilities

Introduction

Video
00:00:25

OWASP Mobile Top 10 Vulnerabilities

Video
00:04:45

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
00:00:20

Module 8: Vulnerable Mobile Apps

Introduction

Video
00:00:24

Insecure Logging Vulnerability

Video
00:03:53

Hardcoding Issues

Video
00:04:40

Insecure Data Storage

Video
00:05:18

Summary

PDF

Technical References

PDF

Quiz

Exercise

Post Module Activity

PDF

Conclusion

Video
00:00:19

Module 9: Practical Lab (All Safe)

Introduction

Video
00:00:29

Application Overview

Video
00:00:49

Installing AllSafe

Video
00:01:56

Firebase Database

Video
00:01:46

Hardcoded Credentials

Video
00:03:52

Insecure Logging

Video
00:01:43

Insecure Shared Preference

Video
00:03:42

Deep Link Exploitation

Video
00:06:18

Pin Bypass

Video
00:06:32

Root Bypass

Video
00:04:08

Secure Flag Bypass

Video
00:04:17

SQL Injection

Video
00:02:31

Certificate Pinning

Video
00:06:05

Insecure Broadcast Receiver

Video
00:04:09

Vulnerable Webview

Video
00:03:35

Insecure Service

Video
00:02:13

Weak Cryptograhy

Video
00:02:19

Conclusion

Video
00:00:21

Module 10: Practical Lab (Insecure Bank)

Introduction

Video
00:00:29

Insecure Data Storage

Video
00:01:34

Intent Misconfiguration

Video
00:01:26

Insecure Logging

Video
00:01:19

Broadcast Receiver

Video
00:01:51

Parameter Manipultaion

Video
00:01:24

Weak Cryptography

Video
00:02:10

Weak User Enumeration

Video
00:01:39

WebView Implementation

Video
00:04:42

Conclusion

Video
00:00:19

Module 12: Course Conclusion

Course Conclusion

Video
00:01:55

Bonus: Discount on other courses

Bonus: Discount on other courses

PDF

Course Instructor

Tarak Sakhardande

Security Consultant
Tarak Sakhardande is a cybersecurity expert with deep expertise in web app security, mobile testing, and Active Directory pentesting. He specializes in finding vulnerabilities and improving digital defenses.

Key Takeaways

  • Understand Android architecture, permissions, and how Android apps are packaged and deployed.
  • Master the tools and techniques for static and dynamic analysis of Android apps.
  • Learn how to root Android devices and bypass root detection mechanisms.
  • Identify and exploit vulnerabilities in Android apps, including those from the OWASP Mobile Top 10.
  • Gain hands-on experience with real-world vulnerable apps, including practical challenges like weak cryptography, insecure data storage, and improper input validation.
  • Apply practical knowledge in real world scenarios

System Requirements

  • Operating System: Windows, Linux, or macOS with virtualization support enabled.
  • Memory: A minimum of 16 GB RAM.
  • Storage: At least 256 GB of free disk space.

FAQs

Do I need prior experience with mobile app development or Android?

No, this course assumes basic knowledge of penetration testing principles but does not require prior Android development experience.

Are hands-on labs included?

Absolutely! Each module includes practical labs to reinforce the theory and ensure you're ready for real-world scenarios.

Will I be able to apply these skills to real-world Android apps?

Yes! The course focuses on real-world scenarios, and you'll gain experience in testing vulnerable apps that simulate common security issues.

Do I need an Android device for this course?

It is recommended to have an Android device for some practical labs, but you can also use emulators like Genymotion to complete most tasks

Will I receive a certificate?

Yes, participants will receive a certificate of completion after successfully completing the course.

Training Partners

Ready to Master the Art of Pentesting?

Choose our pentesting courses for:

Affordable Price

Unlock your potential with affordable upskilling! Our unbeatable course prices are your chance to level up without breaking the bank. Don't wait to enhance your skills – join us today and take the first step towards a brighter future!

Lifetime Access

Acquire lifetime access to our resources when you buy our courses. With recorded lectures, post-module activities, and walk-through labs, perfecting your understanding of the subject matter like a pro is just a click away. Gain knowledge today and unlock a lifetime of learning.

Certificate of Completion

Upon completing our course, you'll receive a certificate of completion to showcase your new skills. Add it to your resume or LinkedIn profile to stand out to potential employers. Let your accomplishments speak for themselves and take your career to the next level!

Hands-On Experience

Get hands-on experience with real-world scenarios and challenges, giving you practical skills that you can apply immediately in your career.

Expert Instructors

Learn from industry experts with years of experience in pentesting, who are passionate about sharing their knowledge and helping you succeed.

Flexible Learning

Whether you're a beginner or an experienced professional, our courses are designed to meet you where you are and help you reach your goals.

Get in Touch

Have a question, need assistance, or want to collaborate? We’re here to help!

Whether you're looking for cutting-edge cybersecurity solutions or expert training or want to learn more about our services, contact us today.


+91