Ethical Hacking: Mobile Devices and Platforms

Ethical Hacking: Mobile Devices and Platforms

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 52m | 285 MB

Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit. Security professionals need to know how to close the gaps and protect devices, data, and users from attacks. Join author Malcolm Shore as he explores the two dominant mobile operating systems, Android and iOS, and shows ways to protect devices through analysis and testing. Watch this course to review the basics of mobile OS models, the toolsets you need for testing, and the techniques for detecting and preventing the majority of security flaws.

Topics include:

  • Statistic and dynamic analysis of mobile applications
  • Testing on Android
  • Analyzing Android applications
  • Securing iOS applications
  • Jailbreaking iOS for command-line access
  • Analyzing iOS apps
Table of Contents

1 What your mobile applications are really doing
2 Before watching this course
3 Course disclaimer
4 Understand and test for mobile vulnerabilities
5 Static analysis of applications
6 Dynamic analysis of applications
7 Understanding the Android operating system
8 Android security model
9 Preparing for Android testing
10 Extracting and reading the manifest file
11 Extracting and reading JavaScript code
12 Recreating Java source code with JAD
13 Browsing applications directly with JADX
14 Getting command-line access with ADB
15 Install an Android emulator from the SDK
16 Dynamic analysis of Android applications
17 Using Drozer to analyze applications
18 Setting up a KitKat VM
19 iOS applications and vulnerabilities
20 Securing iOS applications by design
21 Jailbreaking for command-line access
22 Preparing to test iOS applications
23 Extracting properties and class headers
24 Disassembling iOS executable code
25 Advancing into dynamic analysis of iOS
26 HarmonyOS To be or not to be
27 Next steps