Android security tools expert atx

OpSecX

Online Security Education Platform

Android Security Tools Expert – ATX

This is a brand new course that covers the most commonly used android security assessment tools. Android Security assessment can be done with great ease if you have good expertise in the right tools. This course includes 12 different tools in over 30 videos. The course covers the features of tools like apktool, androguard, androbugs, dex2jar, baksmali, JD-GUI, drozer, qark, frida, xposed, appmon and mobsf. At the end of the course you will be proficient at using these tools in your day to day android application security assessments.

Modules

Introduction to ATX Course

Introduction to Android Security Tools Expert Course

Apktool

Introduction to Apktool

Apktool rebuilding APK

Dex2Jar, JD-GUI and Baksmali

Dex2Jar and JD-GUI

Androguard

Introduction to Androguard

Other Androguard Features

AndroBugs Framework

Introduction to AndroBugs Framework

Scanning APK with QARK

Scanning Source Code with QARK

Drozer

Introduction to Drozer

Android Application Security Assessment with Drozer

Identifying Attack Surface with Drozer

Drozer Infrastructure Mode

Xposed Framework

Introduction to Xposed Framework

Making an Xposed Module

Instrumenting Apps with Xposed

Frida

Introduction to Frida

Frida Python Binding

Bypassing Passcode with Frida Instrumentation

Источник

Android security tools expert atx

Mobile Security Framework (MobSF)

Version: v3.4 beta

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, XAPK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing.

Made with in India

MobSF is also bundled with Android Tamer, BlackArch and Pentoo.

If you liked MobSF and find it useful, please consider donating.

It’s easy to build open source, try maintaining a project once. Long live open source!

  • Try MobSF Static Analyzer Online:
  • MobSF in CI/CD: mobsfscan
  • Conference Presentations: Slides & Videos
  • MobSF Online Course: OpSecX MAS
  • What’s New: See Changelog

e-Learning Courses & Certifications

  • Free Support: Free limited support, questions, help and discussions, join our Slack channel
  • Enterprise Support: Priority feature requests, live support & onsite training, see

Contribution, Feature Requests & Bugs

Читайте также:  Как удалить we share android

  • Read CONTRIBUTING.md before opening bugs, feature requests and pull request.
  • For Project updates and announcements, follow @ajinabraham or @OpenSecurity_IN.
  • Github Issues are only for tracking bugs and feature requests. Do not post support or help queries there. We have a slack channel for that.

Static Analysis — Android

Static Analysis — Android Source Tree-view

Static Analysis — iOS

Dynamic Analysis — Android APK

  • Amrutha VC — For the new MobSF logo
  • Dominik Schlecht — For the awesome work on adding Windows Phone App Static Analysis to MobSF
  • Esteban — Better Android Manifest Analysis and Static Analysis Improvement.
  • Matan Dobrushin — For adding Android ARM Emulator support to MobSF — Special thanks goes for cuckoo-droid
  • Shuxin — Android Binary Analysis
  • Abhinav Saxena — (@xandfury) — For Travis CI and Logging integration
  • Netguru (@karolpiateknet, @mtbrzeski) — For iOS Swift support, Rule contributions and SAST refactoring.
  • Maxime Fawe — (@Arenash13) — For Matching Strategy implementation of SAST pattern matching algorithms.
  • Abhinav Sejpal (@Abhinav_Sejpal) — For poking me with bugs, feature requests, and UI & UX suggestions
  • Anant Srivastava (@anantshri) — For Activity Tester Idea
  • Anto Joseph (@antojoseph) — For the help with SuperSU
  • Bharadwaj Machiraju (@tunnelshade) — For writing pyWebProxy from scratch
  • Rahul (@c0dist) — Kali Support
  • MindMac — For writing Android Blue Pill
  • Oscar Alfonso Diaz — (@OscarAkaElvis) — For Dockerfile contributions
  • Thomas Abraham — For JS Hacks on UI
  • Tim Brown (@timb_machine) — For the iOS Binary Analysis Ruleset
  • Shanil Prasad (@Rajuraju14) — For improving iOS ATS Analysis

About

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

Источник

OpSecX

Online Security Education Platform

Android Security Tools Expert – ATX

This is a brand new course that covers the most commonly used android security assessment tools. Android Security assessment can be done with great ease if you have good expertise in the right tools. This course includes 12 different tools in over 30 videos. The course covers the features of tools like apktool, androguard, androbugs, dex2jar, baksmali, JD-GUI, drozer, qark, frida, xposed, appmon and mobsf. At the end of the course you will be proficient at using these tools in your day to day android application security assessments.

Description

Android Security Tools Expert is a brand new android application security course from OpSecX.

This course covers the most commonly used open source android security assessment tools. Android Security assessment can be done with great ease if you have good expertise in the right tools. This course includes 12 different tools in over 30 lectures. The course covers the features of tools like apktool, androguard, androbugs, dex2jar, baksmali, JD-GUI, drozer, qark, frida, xposed, appmon and mobsf in detail. This course is best suited for android security engineers, aspiring security students, android developers, security engineers, and security consultants. We have great open source tools available at our disposal, but some are not documented well, or it’s difficult to follow. This course is designed to act as a detailed how to for these tools and helps you to make the best use of these. We cover the most important and useful features of these security tools that you can benefit in your day to day android application security assessments.

Читайте также:  Чем отформатировать флешку под андроид

What are the requirements?

  • Basic Idea of how android applications work.
  • Comfortable with working on command line interfaces
  • Basic understanding of Android Application Security

What am I going to get from this course?

  • Over 30 lectures covering 12 android security tools
  • In depth explanation of the tools and their features
  • Practical demonstrations with detailed explanations
  • Learn how to use security tools to perform security assessment of android applications.

OpSecX Course Certificate

Upon successful completion of the course, you will be given a Certificate of Appreciation and the certificate can be verified from OpSecX online.

Curriculum

Section 1: Introduction to the Course

1. Introduction

Section 2: Apktool

2. Introduction to Apktool
3. Smali 101
4. Apktool rebuilding APK

Section 3: Dex2Jar, JD-GUI and Baksmali

5. Dex2Jar and JD-GUI
6. Baksamli

Section 4: Androguard

7. Introduction to Androguard
8. Other Androguard Features

Section 5: AndroBugs Framework

9. Introduction to AndroBugs Framework

Section 6: QARK

10. Scanning APK wth QARK
11. Scanning Source Code with QARK

Section 7: Drozer

12. Introduction to Drozer
13. Android Application Security Assessment with Drozer
14. Identifying Attack Surface with Drozer
15. Drozer Infrastructure Mode

Section 8: Xposed Framework

16. Introduction to Xposed Framework
17. Making an Xposed Module
18. Instrumenting Apps with Xposed

Section 9: Frida

19. Introduction to Frida
20. Frida Tools
21. Frida CLI
22. Frida Python Binding
23. Bypassing Passcode with Frida Instrumentation
24. Bypassing RootBeer with Frida

Section 10: Appmon

25. Getting started with AppMon
26. Appmon Sniffer
27. Appmon Intruder & Tracer

Section 11: Mobile Security Framework – MobSF

28. Mobile Security Framework Static Analysis
29. Mobile Security Framework Dynamic Analysis
30. Mobile Security Framework Web API Fuzzing

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Источник

Android security tools expert atx

Copy raw contents

Mobile Security Framework (MobSF)

Version: v3.4 beta

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, XAPK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing.

Читайте также:  Зигард медникс программирование под android

Made with in India

MobSF is also bundled with Android Tamer, BlackArch and Pentoo.

If you liked MobSF and find it useful, please consider donating.

It’s easy to build open source, try maintaining a project once. Long live open source!

  • Try MobSF Static Analyzer Online:
  • MobSF in CI/CD: mobsfscan
  • Conference Presentations: Slides & Videos
  • MobSF Online Course: OpSecX MAS
  • What’s New: See Changelog

e-Learning Courses & Certifications

  • Free Support: Free limited support, questions, help and discussions, join our Slack channel
  • Enterprise Support: Priority feature requests, live support & onsite training, see

Contribution, Feature Requests & Bugs

  • Read CONTRIBUTING.md before opening bugs, feature requests and pull request.
  • For Project updates and announcements, follow @ajinabraham or @OpenSecurity_IN.
  • Github Issues are only for tracking bugs and feature requests. Do not post support or help queries there. We have a slack channel for that.

Static Analysis — Android

Static Analysis — Android Source Tree-view

Static Analysis — iOS

Dynamic Analysis — Android APK

  • Amrutha VC — For the new MobSF logo
  • Dominik Schlecht — For the awesome work on adding Windows Phone App Static Analysis to MobSF
  • Esteban — Better Android Manifest Analysis and Static Analysis Improvement.
  • Matan Dobrushin — For adding Android ARM Emulator support to MobSF — Special thanks goes for cuckoo-droid
  • Shuxin — Android Binary Analysis
  • Abhinav Saxena — (@xandfury) — For Travis CI and Logging integration
  • Netguru (@karolpiateknet, @mtbrzeski) — For iOS Swift support, Rule contributions and SAST refactoring.
  • Maxime Fawe — (@Arenash13) — For Matching Strategy implementation of SAST pattern matching algorithms.
  • Abhinav Sejpal (@Abhinav_Sejpal) — For poking me with bugs, feature requests, and UI & UX suggestions
  • Anant Srivastava (@anantshri) — For Activity Tester Idea
  • Anto Joseph (@antojoseph) — For the help with SuperSU
  • Bharadwaj Machiraju (@tunnelshade) — For writing pyWebProxy from scratch
  • Rahul (@c0dist) — Kali Support
  • MindMac — For writing Android Blue Pill
  • Oscar Alfonso Diaz — (@OscarAkaElvis) — For Dockerfile contributions
  • Thomas Abraham — For JS Hacks on UI
  • Tim Brown (@timb_machine) — For the iOS Binary Analysis Ruleset
  • Shanil Prasad (@Rajuraju14) — For improving iOS ATS Analysis

You can’t perform that action at this time.

You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.

Источник

Оцените статью