Understand Android architecture, system components, HAL, libraries, runtime, and security model.
Analyze Android application structure, IPC, publishing, and security fundamentals.
Set up a mobile hacking lab, root/jailbreak devices, and configure ADB, Burp Suite, Frida, and MobSF.
Perform Android penetration testing, network interception, and dynamic instrumentation with Frida.
Reverse engineer APKs using Apktool and JADX for static and code analysis.
Discover and exploit Android attack surfaces: exported components, deep links, WebViews, insecure storage, and SQL injection.
Hands-on with tools: ADB, Android Studio Emulator, Burp Suite, Frida, MobSF, Apktool, JADX, and more.
This hands‑on Android Security course teaches you to identify, exploit and remediate security issues in Android applications. You'll work through a structured methodology aligned to OWASP MASVS and MSTG, combining static, dynamic and runtime analysis.
You'll reverse APKs with JADX, automate assessments with MobSF, and instrument apps with Frida/Objection to bypass protections like SSL pinning and root/emulator checks. We cover insecure storage, IPC abuse, WebView risks, exported components, and network weaknesses.
