Mobile Application Penetration Testing

Mobile application penetration testing for Android and iOS is the main emphasis of this course. The course will provide a strong basis for continuing a career as a mobile application penetration tester by showcasing typical approaches to extract sensitive data from Android and iOS applications, including API Keys, stored secrets, and firebase databases. The common approaches and techniques you can use to launch bug bounty hunting mobile applications will be covered in this course.

Interested in attending? Have a suggestion about running this event near you?
Register your interest now

Description

How to follow the processes for penetration testing and testing mobile applications
How to set up a lab environment to examine mobile apps for iOS and Android that have been downloaded directly from the Apple App and Google Play Stores
Sensitive data, such as URLs, Storage Buckets, Firebase Databases, and other Stored Secrets, are manually analysed in mobile applications
Automated mobile application analysis using programmes like MobSF
How to exploit Frida and Objection for iOS and Android to bypass SSL Pinning
The Top Ten Mobile OWASP Threats
Methods for jailbreaking iOS devices

Prerequisites

Fundamental knowledge of API- or Web-based penetration testing. It is expected that you have some expertise with mobile application platforms like iOS and Android (such as how to access settings, install apps, etc.).

Audience Profile

  • Penetration Tester
  • Ethical hackers
  • Red Team members
  • Vulnerability Tester
  • Security Analyst
  • Vulnerability Assessment Analyst
  • Network Security Operations

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright ICSI, Limited
(International CyberSecurity Institute) 2023