
Simulated hacking of Android apps using Frida
boanproject
You can learn how to fully utilize Frida, which is used in mock hacking practice.
중급이상
Android, Penetration Testing, Frida
This is [Penetration Test Expert - System Edition] for those preparing to become penetration test experts or IT security personnel. If you want to learn the ability to defend and support organizations in assessing and mitigating infrastructure and web application risks, this course will help you achieve it.

Understanding the Penetration Testing Process
Information collection & vulnerability listing
Exploiting vulnerabilities
Privilege escalation via buffer overflow
persistence after penetration
Penetration Testing Expert - System Edition
We'll help you from basic coursework to practical application! 🔥
Offensive is still unfamiliar in Korea.
Because the best defense is to identify and mitigate vulnerabilities in advance, we've created this course to help you mitigate vulnerabilities in the systems you use .
I, too, went through a period when I first started studying penetration testing. In Korea, there's no such profession as penetration testing , and the position is often defined as "simulated hacking expert." However, if you're looking to become a "penetration testing expert" rather than just a simulated hacking expert, you'll likely be wondering where to begin.
No more struggling alone. We'll provide you with a learning environment where you can study together, not alone, but through a community .
If you aspire to become a professional penetration tester or IT security professional who relies on your ability to defend and support organizations by assessing and mitigating infrastructure and web application risks, the Penetration Testing Specialist course will help you achieve this. This course also prepares you for exams and certifications such as the OSCP, eCPPTv2, CompTIA PENTEST+, GPEN, and CEH.
The Penetration Testing Expert Basics course is taught by a certified penetration tester. (Detailed certifications can be found below!)
This is a hands-on course, with practice materials provided so you can practice directly while watching. Reference videos will also be provided to broaden your perspective beyond basic concepts.
While the entire course is provided via video, there are times when the hands-on experience isn't perfect. Don't worry. We're available 24/7 through our channel.
Please come to our Discord channel where we can provide real-time answers and ask your questions.
The Penetration Testing Expert course has a sequel in the series. (The next installment, Exploit Development, will cover the detailed BOF covered in this system section. It's scheduled to launch in early May.)
For those who want to study penetration testing in depth
System through various techniques
Anyone who wants to try elevating their privileges
Penetration testing certification
Anyone interested
Q. Can I take this course even if I don't know anything about security?
A. The Penetration Testing Specialist - Basic course requires a certain level of IT knowledge and skills (e.g., basic Linux commands). Therefore, if you're new to IT, it may be somewhat challenging to take.
Q. Will the Penetration Testing Specialist - Basics course help me prepare for certification?
A. I also learned while preparing for my penetration testing certification, and I'm sharing the knowledge I've gleaned through various communication channels, so I believe you'll find it easy to prepare for the certification. (Note: This may vary from person to person.)
Q. Can the content covered in this lecture be applied to practical work?
A. Because it is difficult to configure the environment for penetration testing, it can be fully utilized in general environments except for the ones provided as reference videos (AD, AWS).
Q. What is the environment like before taking the class?
A. Typically, the system requires at least two virtual machines and a generous storage capacity of approximately 100 GB. The compressed training data provided is 50 GB.
Q. Do I need to know how to reverse?
A. No. You only need to have a basic understanding of reversing (registers, memory structures, tool usage, etc.). We'll cover more detailed information in subsequent courses.
History
Certificate
Other qualifications
🗸 Please check before taking the class!
Who is this course right for?
For those who want to study penetration testing in depth
Anyone who wants to gain system privileges through various techniques
Anyone interested in penetration testing certification
Need to know before starting?
Operating system
Network Basics
Python
Reversing Basics
NuriLab is a cybersecurity company established to protect human values. We develop leading malware analysis platforms and digital forensic tools, and provide penetration testing and professional training services to prevent various cyber threats.
We develop code analysis platforms and digital forensic tools, and provide penetration testing and professional training services to prevent various cyber threats.
All
42 lectures ∙ (14hr 8min)
4. Kali Setting
10:16
5. Linux Vuln Check
15:37
7. Linux Command
34:42
8. Windows Command
31:33
All
4 reviews
4.5
4 reviews
Reviews 6
∙
Average Rating 3.5
5
very good excellent!!
Hello. Thank you for leaving a review. If you have any questions, please let me know through the channel. Also, if there is any part of the video that needs to be edited, please let me know through DM at any time.
Reviews 16
∙
Average Rating 5.0
Edited
Reviews 1
∙
Average Rating 4.0
Reviews 10
∙
Average Rating 3.9
4
I am listening to the lecture well. However, I think there is some lack of synchronization between the lecture content and the lecture notes (added content, typos, etc.). I think it would be good if you could improve it.
Oh, sorry. We will update it regularly to reflect this.
Explore other courses in the same field!