K_Ethical Hacking_ Mobile Devices and Platforms

00_01_ Introduction.
00_02_ What_you_should_know.
00_03_ Course_disclaimer.
01_01_ Understanding_and_testing_for_mobile_vulnerabilities.
01_02_ Static_Analysis_of_mobile_applications.
01_03_ Dynamic_analysis_of_mobile_applications.
02_01_ Understanding_the_Android_operating_system.
02_02_ Understanding_the_Android_security_model.
02_03_ Preparing_the_Android_testing_environments.
02_04_ Extracting_and_reading_the_Manifest_file_PART1.
02_05_ Extracting_and_reading_the_source_code.
02_06_ Extracting_Java_source_code_files_with_JAD.
02_07_ Browsing_applications_directly_with_JADX.
02_08_ Getting_command_line_access_with_ADB.
02_09_ Installing_an_emulated_Android_device.
02_10_ Dynamic_analysis_of_Android_applications.
02_11_ Using_Drozer_to_analyse_applications.
02_12_ Setting_up_a_KitKat_VM.
03_01_ Understanding_iOS_applications.
03_02_ Securing_iOS_applications_by_design.
03_03_ Jailbreaking_for_command_line_access_to_iOS_applications.
03_04_ Preparing_to_test_iOS_applications.
03_05_ Extracting_properties_and_class_headers_from_iOS_applications.
03_06_ Disassembling_iOS_executable_code.
03_07_ Advancing_to_dynamic_analysis_of_iOS_applications.
04_01_ Whats_next.

Comments