We have created a method for mobile diagnostic methods (static/dynamic) that can be learned by following the practice app and lecture materials. It covers everything from the basics to the techniques and tips used in practice, so it will be of great help to mobile consultants.
Static analysis method based on vulnerability checklist
Preliminary knowledge for bypassing mobile solutions
Basic knowledge for vulnerability analysis from Android basics
Android security vulnerability diagnosis/analysis, Learn step by step, from the basics to actual code.
📣 Please note before taking the class! • Due to issues with the recording environment, the audio quality of the lectures is generally uneven. ( Noise occurs at the beginning of each video.) Please refer to the [Preview] of the lecture before taking the class.
Mobile Analysis Methodology from a Simulated Hacking Practitioner
This guide is designed for students who want to learn how to diagnose mobile vulnerabilities, those who have just started consulting and are looking for a direction to study, and those who want to bypass solutions applied to mobile applications.
It is divided into parts from basic to intermediate, and you can take the basic, beginner, or intermediate classes according to your desired content.
PART 1: Understanding Android Basics
We'll walk you through Android architecture and APK files, decompiling/repackaging for vulnerability analysis, and identify potential vulnerabilities through a simple hands-on app.
If you have no prior knowledge about mobile, this PART will help you acquire basic knowledge.
PART 2: Static/Dynamic Analysis Beginner to Intermediate
We have created a practical app and video lectures to help you learn various analysis methods for Android APK file analysis.
You will learn checklist-based static analysis techniques used in practice and dynamic methods necessary to bypass mobile solutions.
PART 3: Intermediate Malware Analysis
This part allows you to get one step closer to analyzing and bypassing solutions by analyzing malware with similar functions to the solution.
We will review the skills learned in PART 2 by analyzing actual malware used.
Recommended for these people
Who is this course right for?
Anyone who wants to learn how to diagnose mobile vulnerabilities
Anyone who needs prior knowledge to bypass mobile solutions
For those looking for a direction to study for mobile consulting