In this video from our Android Malware Analysis course by Tom Sermpinis you can see how Android malware analysis is done in a few simple steps - the demonstration includes the most important tools to use. If you're just looking into this topic, this is a great start!
One of the bigger threats in the recent years of Android’s existence is malware, and in this course we are going to examine the existing Android malware, learn how they work, straight from the source and what harm they can cause. In this course we will get introduced to the basics of Malware development and analysis.
- Android malware functions & properties
- Android malware most common examples
- In depth examination and analysis of the most lethal and famous Android malware
- Android malicious code characteristics
- Mobile malware development principles
What skills will you gain?
- Android malicious application analysis
- Android malware analysis
- Using Android app analysis tools
- Static and dynamic analysis
- Android ecosystem exploitation through existing malware
What will you need?
- PC with a preferred operating system (Mac OSX 10.5+, Windows 7+, Linux)
- Android Device
What should you know before you join?
- Basics of Android Ecosystem
- Basics of Java and Programming in general
- Basics of XML
Course format:
- The course is self-paced – you can visit the training whenever you want and your content will be there.
- Once you’re in, you keep access forever, even when you finish the course.
- There are no deadlines, except for the ones you set for yourself.
- We designed the course so that a diligent student will need about 18 hours of work to complete the training.
Tools you will use:
- ApkTool
- Zipalign tool
- Dex2jar
- JD-GUI
- APKInspector
- Dexter
- Metsaploit
Your instructor: Tom Sermpinis
- 4 years of experience in Android ecosystem
- 7 years of experience in Penetration Testing
- Java, C++, Python
- Editor of “Penetration Testing with Android Devices” and “Penetration Testing with Kali 2.0” courses of PenTest Magazine.
- Editor on DeltaHacker Magazine
- 4 years of blogging on Penetration Testing topics
- Android and Hacking Enthusiast
[custom-related-posts title="Related content:" none_text="None found" order_by="title" order="ASC"]
Author
Latest Articles
- BlogApril 7, 2022Detecting Fake Images via Noise Analysis | Forensics Tutorial [FREE COURSE CONTENT]
- BlogMarch 2, 2022Windows File System | Windows Forensics Tutorial [FREE COURSE CONTENT]
- BlogAugust 17, 2021PowerShell in forensics - suitable cases [FREE COURSE CONTENT]
- OpenMay 20, 2021Photographic Evidence and Photographic Evidence Tampering