Free Combo List -
Config Shop
Best Config Shop

Create an account

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
robotoAndroid App Hacking - Black Belt Edition

[Image: 323d2017fdc98f5d0bd4703c5e20835e.jpeg]
Published 7/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 41.22 GB | Duration: 50h 57m
Becoming the lead expert in android app security

What you'll learn
Deep understanding of the android app structure
How to exploit Activities, BroadcastReceiver and ContentProvider (SQL injection & Path Traversal)
Bypassing Rooting Detection (SMALI and FRIDA)
Bypassing Certificate Pinning (SMALI and FRIDA)
Performing a man-in-the-middle attack
Analyzing-/ Manipulating the network traffic of a mobile app
Creating call- and flow graphs to reverse engineer strong obfuscated apps
Manipulating Java and C/C++ methods (FRIDA & SMALI)
Reading- / Writing SMALI code
Injecting own (custom) code into existing applications
Deep understanding of the android permission model
Modifying games (infinite lives, high score, invisble, invincible) - Writing a trainer
Analzying bluetooth low energy connections
Dealing with different encryption types (e.g. AES)
Ethical and legal principles
Android knowledge is not required (This course teaches everything)
No real smartphone required
Laptiop / PC
In this course you will learn absolutely everything about android app hacking. This course teaches you the ethical principles and enables you to become the top expert of your company regarding to app security. We learn really complex attacks in the most funny way that's possible, by hacking a mobile game. Legal note:The game we are going to hack is licensed under the GNU GPL, which means, we are allowed to perform such modifications. Hacking apps without having the permission of the author is strongly forbidden! The things you learn are related to security research. I am teaching you all of this in a legal and ethical way. Course - Structure:In the installation chapter we will analyze different smartphone setups, their strength and their weaknesses. We unlock our device and use certain features to already start hacking our first apps. We will learn how to analyze bluetooth low energy connections and get familiar with the Android Debug Bridge (ADB).We move on to the android app structure. Here we gain a rock solid understanding about the key components of an android app. We will analyze the AndroidManifest.xml and learn how to exploit activities, broadcast receiver and content provider. We will write our own small apps to exploit SQL injections and path traversals.Afterwards we take a deep dive into reverse engineering. We will learn how to decompile an android app and reconstruct the Java code. We will have a look at different decompilers and create flow- and call graphs to deal with highly obfuscated apps. Finally a nice application is waiting for us to practice all the things we have learned so far.Then we have the treasure of this course, the SMALI chapter. SMALI is like an assembly language of an android application and gives us unlimited power in hacking them. We practice our skills by modifying our mobile game to have infinite lives, become invisible or invincible. We add multiple player shots, manipulate the fire rate and many more. In the man-in-the-middle chapter we will learn how to analyze the network traffic of a mobile app. We will gain an understanding about HTTPS and how to analyze these connections. We will learn how certificate pinning works and bypass several different types of it. The last thing that is missing is FRIDA, which is an amazing framework to perform runtime manipulations within an app. We will hook into the pseudorandom number generator (PRNG) to modify a dice application. We will learn how to scan the memory for certain instances and how to interact with the UI thread of an app. We will create new objects and practice all of this by writing our own trainer for a gaming application. The cherry on top will be the analysis of a native c function with Ghidra and the manipulation and modification with FRIDA.After getting through all these chapters you will be the top expert in android app security of your company. Therefore, what you are wainting for? Smile
Section 1: Installation and Setup
Lecture 1 Setup - Theory
Lecture 2 Installation (System & Android Studio)
Lecture 3 Emulator - Installation
Lecture 4 Emulator - Usage (Secret Features)
Lecture 5 Androidx86 Virtual Machine - Setup
Lecture 6 Developer Options
Lecture 7 Developer Options - Secrets ( Game Hacking )
Lecture 8 Developer Options - Bluetooth Low Energy Hacking
Lecture 9 Bluetooth Low Energy - Furby App Hacking
Lecture 10 Android Debug Bridge - Theory
Lecture 11 Android Debug Bridge (ADB) - HandsOn (White - Belt)
Section 2: App Structure
Lecture 12 Filestructure of an APK
Lecture 13 Dalvik / Dex
Lecture 14 Classes.dex
Lecture 15 Decompiling - Preperation
Lecture 16 Decompiling - HandsOn
Lecture 17 AndroidManifest.xml
Lecture 18 App - Permissions
Lecture 19 Activities
Lecture 20 Activities - Hacking
Lecture 21 Activity - Bonus (Bypassing Login - Own Application)
Lecture 22 Intents
Lecture 23 Intents - Examples
Lecture 24 BroadcastReceiver
Lecture 25 BroadcastReceiver - Hacking (Alarm App)
Lecture 26 BroadcastReceiver - Hacking via own App
Lecture 27 Services
Lecture 28 ContentProvider
Lecture 29 ContentProvider - SQL Injection
Lecture 30 ContentProvider - Database Attacks (SQLi - Permission / Bypass)
Lecture 31 ContentProvider - PathTraversal Attack
Lecture 32 Application Signing
Lecture 33 Application Signing - Deep Dive
Lecture 34 BlueBox Master Key Vulnerability (Signing)
Section 3: Reverse Engineering Android Apps
Lecture 35 Dex2Jar
Lecture 36 Jadx-Gui
Lecture 37 Jadx-Gui HandsOn
Lecture 38 Secret Super Weapon
Lecture 39 Reversing Apps
Lecture 40 Creating a CallGraph (CG)
Lecture 41 Creating a FlowGraph (FG)
Lecture 42 Challenge - Intro
Lecture 43 Challenge - Hacking Activities
Lecture 44 Challenge - Hacking Content Provider
Lecture 45 Challenge - Hacking BroadCast Receiver
Lecture 46 Challenge - Password (Decryption)
Section 4: Smali
Lecture 47 Recap
Lecture 48 Smali - Introduction
Lecture 49 Smali - Patching
Lecture 50 Challenge - Solution
Lecture 51 Registers
Lecture 52 Types
Lecture 53 P0 - Register
Lecture 54 Dalvik Opcodes
Lecture 55 Smali File Structure
Lecture 56 Practice - Smali
Lecture 57 Practice - Solution
Lecture 58 Orange Belt - Intro
Lecture 59 Orange Belt - Solution
Lecture 60 IF - Intro
Lecture 61 IF / ELSE / GOTO
Lecture 62 IF / ELSE / GOTO - Code Analysis
Lecture 63 IF / ELSE / GOTO - Blocks
Lecture 64 IF / ELSE / GOTO - Practice
Lecture 65 Smali Patching - Flipping the logic
Lecture 66 Smali Patching - Deleting Code
Lecture 67 Smali Patching - Jump Instructions
Lecture 68 Rooting Detection - Intro
Lecture 69 Rooting Detection (bypass) - Solution
Lecture 70 Rooting Detection - Solution2 (Bonus)
Lecture 71 Smali - Objects and Methods
Lecture 72 Smali - Static Methods
Lecture 73 Smali - Hello World (Yes, this late)
Lecture 74 Printing out secrets - System.out (Written in Smali)
Lecture 75 Patching XOR encryption
Lecture 76 One challenge to recap all - Intro
Lecture 77 One challenge to recap all - Part 1
Lecture 78 One challenge to recap all - Part 2
Lecture 79 One challenge to recap all - Part 3
Lecture 80 One challenge to recap all - Solution
Lecture 81 Blue Belt - Challenge (Intro)
Lecture 82 Blue Belt - Challenge (Hint)
Lecture 83 Blue Belt - Challenge (Solution)
Section 5: Man in the Middle
Lecture 84 Adress Resolution Protocol (ARP)
Lecture 85 MitM - Setup
Lecture 86 Intercepting - Theory
Lecture 87 BurpSuite - Setup
Lecture 88 Reset the Setup
Lecture 89 HTTPS - Technical View
Lecture 90 Installing a Certificate
Lecture 91 MitM Setup - Virtual Machine (VM)
Lecture 92 Certificate Pinning - Theory
Lecture 93 Certificate Pinning - OpenSSL (Bonus)
Lecture 94 Certificate Pinning - Patching Fingerprint
Lecture 95 Certificate Pinning - Patching Certificate
Lecture 96 Certificate Pinning - Objection (Bypass)
Section 6: FRIDA
Lecture 97 Introduction
Lecture 98 Install
Lecture 99 Hooking - Theory
Lecture 100 Dize Game - HandsOn
Lecture 101 Dize App - Analysis
Lecture 102 Dize App - Observing Parameters
Lecture 103 Dize App - Modifying Parameters
Lecture 104 Function Overloading
Lecture 105 Timing (Hooking)
Lecture 106 Challenge - Rooting Detection (bypass)
Lecture 107 Challenge - Rooting Detection (solution)
Lecture 108 Actively calling a method
Lecture 109 Instance Methods
Lecture 110 Working with Instances
Lecture 111 HandsOn
Lecture 112 HandsOn - Solution
Lecture 113 Instance as a parameter
Lecture 114 Existing instance as a parameter
Lecture 115 Challenge - Create multiple player shots
Lecture 116 Challenge - Mulitple player shots (solution)
Lecture 117 Constructor hooking
Lecture 118 Manipulating UI Thread
Lecture 119 Writing a trainer
Lecture 120 Hooking the Native Development Kit (NDK)
Lecture 121 NDK hooking - Easy Way
Lecture 122 NDK hooking - Hard way
Lecture 123 NDK hooking - timing
Lecture 124 hooking ndk
Lecture 125 Reversing C - function in ghidra (Bonus)
Lecture 126 Hooking C - function in frida (Bonus)
Security Analyst / Ethical Hacker,Android app developer,Bug Bounty Hunter,Everyone who likes to manipulate android apps / games Smile


Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Links are Interchangeable - No Password - Single Extraction

Cuphead é um videogame popular de corrida e arma desenvolvido pela StudioMDHR Entertainment. O jogo foi lançado em 2017 e rapidamente ganhou muitos seguidores devido aos seus gráficos únicos e jogabilidade desafiadora.
Hidden Content:
You must reply to see this link Or Upgrade Your Account
O jogo segue as aventuras de Cuphead e seu irmão Mugman, que devem atravessar vários níveis para pagar uma dívida que têm com o diabo. O jogo apresenta animação desenhada à mão inspirada nos desenhos animados dos anos 1930, e os personagens e níveis são projetados para refletir a estética daquela época.

웹사이트 또는 제안의 합법성을 확인함으로써 사용자는 금전적 손실이나 신원 도용을 초래할 수 있는 사기의 피해자가 되는 것을 피할 수 있습니다. 먹튀사이트 시간과 노력 절약: 사기 확인 사이트는 웹사이트 및 제안에 대한 정보에 빠르고 쉽게 액세스할 수 있도록 하여 사용자의 시간과 노력을 절약할 수 있습니다. 웹 사이트나 제안을 조사하는 데 시간을 보내는 대신 사용자는 사기 확인 사이트를 사용하여 필요한 정보를 얻을 수 있습니다.
Hidden Content:
You must reply to see this link Or Upgrade Your Account
 마음의 평화 제공: 사기 확인 사이트는 정보에 입각한 결정을 내릴 수 있도록 지원하여 사용자에게 마음의 평화를 제공할 수 있습니다. 웹사이트나 제안이 합법적이라는 사실을 알면 사용자는 이에 참여하기로 한 결정에 확신을 가질 수 있습니다. 이는 금융 및 전자 상거래와 같이 신뢰가 필수적인 산업에서 특히 중요할 수 있습니다.

Bem-vindo ao Baixakigeeks, seu destino preferido para baixar o renomado jogo de terror de sobrevivência,
Hidden Content:
You must reply to see this link Or Upgrade Your Account
 . O Baixakigeeks é uma plataforma confiável que oferece uma ampla gama de opções de software, incluindo a versão mais recente de Resident Evil 4. Seja você um fã da série Resident Evil ou um amante de experiências intensas de jogo, você veio ao lugar certo.
Resident Evil 4, desenvolvido pela Capcom, é uma parcela inovadora da franquia de longa duração. Leva os jogadores a uma aventura emocionante ao assumir o papel de Leon S. Kennedy, um agente do governo dos EUA encarregado de resgatar a filha do presidente de um culto sinistro. Com sua jogabilidade envolvente, ação intensa e ambientes atmosféricos, Resident Evil 4 cativou jogadores em todo o mundo.
Baixar Resident Evil 4 do Baixakigeeks é muito fácil. Nossa plataforma possui uma interface amigável, permitindo que você navegue e localize sem esforço o jogo que está procurando. Para começar, basta visitar nosso site e utilizar a barra de pesquisa para encontrar Resident Evil 4. Depois de localizar o jogo, clique no botão de download para iniciar o processo.
Priorizamos a segurança dos downloads de nossos usuários. Todo software disponível no Baixakigeeks passa por uma minuciosa verificação de vírus e malwares, garantindo a proteção do seu aparelho. Além disso, nossos downloads são atualizados regularmente para fornecer a versão mais recente de Resident Evil 4, garantindo uma ótima experiência de jogo.
Baixakigeeks oferece Resident Evil 4 para várias plataformas, incluindo PC, Xbox e PlayStation. Você pode selecionar a versão que se adapta ao seu sistema de jogo, permitindo que você mergulhe totalmente no mundo envolvente de Resident Evil 4. Embora o Baixakigeeks seja uma fonte confiável para baixar Resident Evil 4, sempre aconselhamos ter cuidado ao obter software da Internet. É crucial ter um software antivírus confiável instalado em seu dispositivo e verificar a autenticidade do site antes de prosseguir com qualquer download.
Se você está pronto para embarcar em uma jornada emocionante pelo mundo do horror de sobrevivência, visite Baixakigeeks hoje e baixe Resident Evil 4 sem problemas. Prepare-se para encontros intensos, resolva quebra-cabeças intrincados e experimente o horror icônico que definiu a franquia Resident Evil.

Users browsing this thread:
1 Guest(s)

Forum software by © MyBB Theme © iAndrew 2016