Useful Links
Computer Science
Cybersecurity
Android Security and Penetration Testing
1. Introduction to Android Security
2. Setting Up a Penetration Testing Environment
3. Static Analysis (SAST)
4. Dynamic Analysis (DAST)
5. Network Traffic Analysis
6. Common Android Vulnerabilities (OWASP Mobile Top 10)
7. Advanced Security Topics
8. Reporting and Mitigation
Dynamic Analysis (DAST)
Runtime Environment Exploration
Interacting with the Device via ADB Shell
Shell Commands
File System Navigation
Process Management
Exploring the Application's Data Directory
/data/data/<package_name>/
File and Directory Structure
Permission Analysis
Analyzing SharedPreferences
Location and Format
Sensitive Data Storage
XML Structure
Examining SQLite Databases
Database File Identification
Data Extraction and Analysis
Schema Analysis
Checking for Insecure File Permissions
World-readable Files
World-writable Files
Permission Misconfigurations
Runtime Manipulation and Hooking
Introduction to Frida
Setting up Frida Server
Writing Frida Scripts
Function Hooking
Bypassing Client-side Controls
Using Xposed Framework
Framework Installation
Writing Xposed Modules
Common Modules for Security Testing
Hook Management
Method Tracing and Logging
Function Call Tracing
Parameter Logging
Return Value Modification
Analyzing Inter-Process Communication (IPC)
Fuzzing Exported Activities with ADB
Intent Crafting
Activity Invocation
Parameter Manipulation
Interacting with Exported Services
Service Binding
Service Communication
AIDL Interface Testing
Exploiting Insecure Broadcast Receivers
Sending Crafted Broadcasts
Privilege Escalation
Data Injection
Querying and Manipulating Content Providers with Drozer
Data Extraction
Permission Bypass Techniques
SQL Injection Testing
Memory Analysis
Dumping Process Memory
Using GDB
Using LLDB
Memory Dump Tools
Searching for Sensitive Data in Memory
Credentials
Cryptographic Keys
Session Tokens
Using Memory Editing Tools
GameGuardian
Cheat Engine
Value Searching
Real-time Modification
Behavioral Analysis
Monitoring File System Access
File Creation and Modification
Permission Changes
Network Activity Monitoring
Connection Establishment
Data Transmission
System Call Tracing
Strace Usage
System Call Analysis
Previous
3. Static Analysis (SAST)
Go to top
Next
5. Network Traffic Analysis