Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Android Malware Analysis in Kali
Training Overview
Description of Training
Video Overview (2:50)
Chapter 1. Introduction
1. Introduction (2:50)
2. Why Android (1:31)
Chapter 2. Android Security Architecture
3. Android Platform (1:24)
4. Android Security Architecture (1:54)
5. Android Security Features (1:46)
6. Google Security Services (1:14)
Chapter 3. APK Anatomy
7. Android Application Anatomy (2:52)
8. APK File Structure (2:11)
9. DEX File (1:18)
Chapter 4. Mobile Malware Types
10. Mobile Malware Types (6:58)
Chapter 5. Setup Your Lab
11. Tools Explained (1:00)
12. Setup Your Lab in Kali (1:50)
Chapter 6. Where to Find Malicious APKs
13. Malware Distribution Mechanisms (3:38)
14. Acquire Malicious Mobile Apps (4:36)
15. Create a Malicious Mobile App (3:09)
16. Extract a Mobile App From a Phone (1:52)
Chapter 7. Malware Analysis Approaches
17. Static vs Dynamic Malware Analysis (5:06)
Chapter 8. Reverse Engineer a Mobile App
18. Unzip vs Decode (1:12)
19. Decode and Decompile Android Apps (2:57)
Chapter 9. Perform Static Analysis
20. Keyword Search Techniques (1:44)
21. Dangerous Permissions (1:01)
22. Analysis of a Spyware App (3:41)
23. Analysis of a Stalkware APK (12:58)
24. Analysis of Trojan APK (7:43)
Chapter 10. Inject Legit APKs with Malware
25. Inject Whatsapp Application With a Payload (4:10)
26. Injecting a Legit APK and Analyze it using MobSF (5:25)
Chapter 11. Execute Dynamic Analysis
27. Download and Setup Genymotion (3:48)
28. Dynamic Analysis (3:49)
29. SSL Interception (4:09)
20. Keyword Search Techniques
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock