Mobile application penetration testing for Android and iOS is the main emphasis of this course. The course will provide a strong basis for continuing a career as a mobile application penetration tester by showcasing typical approaches to extract sensitive data from Android and iOS applications, including API Keys, stored secrets, and firebase databases. The common approaches and techniques you can use to launch bug bounty hunting mobile applications will be covered in this course.
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
How to follow the processes for penetration testing and testing mobile applications
How to set up a lab environment to examine mobile apps for iOS and Android that have been downloaded directly from the Apple App and Google Play Stores
Sensitive data, such as URLs, Storage Buckets, Firebase Databases, and other Stored Secrets, are manually analysed in mobile applications
Automated mobile application analysis using programmes like MobSF
How to exploit Frida and Objection for iOS and Android to bypass SSL Pinning
The Top Ten Mobile OWASP Threats
Methods for jailbreaking iOS devices
Fundamental knowledge of API- or Web-based penetration testing. It is expected that you have some expertise with mobile application platforms like iOS and Android (such as how to access settings, install apps, etc.).
- Penetration Tester
- Ethical hackers
- Red Team members
- Vulnerability Tester
- Security Analyst
- Vulnerability Assessment Analyst
- Network Security Operations