1. Device Architecture and Application Interaction.zip
857.9 MB
1 - Introduction
2 - Mobile Problems and Opportunities
3 - What You Need to Know iOS
4 - What You Need to Know Android
5 - Building Your Lab
6 - iOS Application Interaction
7 - Android Application Interaction
2 - Mobile Problems and Opportunities
3 - What You Need to Know iOS
4 - What You Need to Know Android
5 - Building Your Lab
6 - iOS Application Interaction
7 - Android Application Interaction
2. The Stolen Device Threat and Mobile Malware.zip
1 GB
1 - The Stolen Device Threat
2 - Jailbreaking iOS
3 - Rooting Android
4 - Data Storage on Android
5 - Data Storage on iOS
6 - Mitigating Malware
2 - Jailbreaking iOS
3 - Rooting Android
4 - Data Storage on Android
5 - Data Storage on iOS
6 - Mitigating Malware
3. Static Application Analysis.zip
996.3 MB
1 - Static Application Analysis
2 - Manual Static Analysis
3 - Automating App Analysis
4 - Obfuscated Apps
5 - Third Party App Platforms
2 - Manual Static Analysis
3 - Automating App Analysis
4 - Obfuscated Apps
5 - Third Party App Platforms
4. Dynamic Mobile Application Analysis and Manipulation.zip
722.3 MB
1 - Dynamic Mobile Application Analysis and Manipulation
2 - Android Dynamic Anaysis with Drozer
3 - iOS Dynamic Analysis with Needle
4 - Modifying Mobile Applications
5 - Mobile Application Runtime Manipulation
6 - Automated Runtime Manipulation with Objection
7 - Application Security Verification
2 - Android Dynamic Anaysis with Drozer
3 - iOS Dynamic Analysis with Needle
4 - Modifying Mobile Applications
5 - Mobile Application Runtime Manipulation
6 - Automated Runtime Manipulation with Objection
7 - Application Security Verification
5. Mobile Penetration Testing.zip
900.1 MB
1 - Mobile Penetration Testing
2 - Network Activity Analysis
3 - Network Manipulation Attacks
4 - Network Traffic Manipulation
5 - SSL/TLS attacks
6 - Intercepting SSL/TLS traffic
7 - Leveraging Mobile Malware
8 - Where to go from here
2 - Network Activity Analysis
3 - Network Manipulation Attacks
4 - Network Traffic Manipulation
5 - SSL/TLS attacks
6 - Intercepting SSL/TLS traffic
7 - Leveraging Mobile Malware
8 - Where to go from here