Android Application Penetration Testing | Mobile Pentesting

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 มิ.ย. 2024
  • Welcome to my newly made course on Android Pentesting. You gonna learn the:
    00:00 - Intro
    00:30 - Prerequisites
    04:06 - Android Architecture
    09:18 - Basic Android Terminologies
    16:10 - Inside of an APK
    22:14 - Setting up of Pentesting Lab
    50:22 - Pentest Methodology
    55:38 - OWASP Mobile Top 10
    1:10:07 - Static Analysis
    2:05:27 - Android App Signing Mechanism
    2:18:42 - Android App Traffic Interception & Analysis
    2:25:12 - Dynamic Analysis
    2:42:47 - Conclusion
    Notes link : drive.google.com/file/d/17-p1...
    Note: I haven't covered tools like Drozer, QARK, Frida & Objection as this video is for beginners and folks who just want to start their career in Mobile Pentesting. In my next videos, I'll surely cover those. :)
    💥Connect Me At💥
    🌍LinkedIn: / h0tplug1n
    🌍Instagram: / h0tplug1n
    🌍Facebook: profile.php?...
    🌍Github: github.com/h0tPlug1n/
    🌍TryHackMe: tryhackme.com/p/sabyasachipaul
    🌍Medium: / h0tplug1n
    🌍Linktree: linktr.ee/h0tPlug1n
    🌍Twitter: / h0tplug1n
    🌍Discord: h0tPlug1n
    💥Popular Videos💥
    🌍Android Pentesting: • Android Application Pe...
    🌍OAuth 2.0: • OAuth 2.0 Authenticati...
    🌍File Inclusion: • LFI & RFI Complete tut...
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 56

  • @h0tPlug1n
    @h0tPlug1n  ปีที่แล้ว

    In 1:52:43 if anyone has problem understanding it, then we are asking the activity manager to start an activity (represented by -a) name VIEW_CREDS2 and it is to be shown by dumping the activity (represented by -n) name APICreds2Activity. Also, use an extra variable (represented as e) whose datatype would be boolean (represented by z) named check_pin and keep its value as false (represented as --ez check_pin false).
    So, in summary in order to directly fetch VIEW_CREDS we need to give pin so providing its value as false and to get the VIEW_CREDS, we need to fetch it via APICreds2Activity. So, we dumped or rather pre-executed APICreds2Activity in order to fetch VIEW_CREDS.
    At least this is what I've understood.. If there's any other explanation then do let me know... I always look forward to learn more. 🤗🤗

  • @tomaszwysocki3042
    @tomaszwysocki3042 6 หลายเดือนก่อน +2

    Great material, you're doing a good job on youtube, keep up the good work 🙂

  • @anirbanroy6309
    @anirbanroy6309 6 หลายเดือนก่อน

    Your sacrifices don't go unnoticed.

  • @radharamandwivedi7609
    @radharamandwivedi7609 วันที่ผ่านมา

    Nice video, I would like to add that for path variables dont put path outside of folder, go inside and then put that address on env variables

  • @ArifAliKhan-vc3nq
    @ArifAliKhan-vc3nq 3 หลายเดือนก่อน

    Appreciate your hard work to clarify the basics of Android PT. I really wish I could this video during my initial career. Nice Attempt bro keep it up. All the Best for your future!!

  • @SatouSei13
    @SatouSei13 ปีที่แล้ว +3

    Thank you so much for this video.
    The way you explain and then give us examples makes it a lot easier to understand the concepts. 🙌

  • @viral_codes
    @viral_codes ปีที่แล้ว

    Thanks for the great video, please make more videos, your way of teaching is really good,pure quality content

    • @h0tPlug1n
      @h0tPlug1n  ปีที่แล้ว +2

      Hi, glad u liked the video. Just preparing something surprising for my viewers. After it gets completed I'll definitely drop a fantastic Android Pentesting video ...

  • @sayednizamuddeen1220
    @sayednizamuddeen1220 4 หลายเดือนก่อน

    Hi Sabyasachi did a fantastic explanation for Android.. good understanding theriatical and lbs

  • @vkshetty990
    @vkshetty990 หลายเดือนก่อน

    this video is life saver bro 😎😎😎😎

  • @yashpharande2386
    @yashpharande2386 3 หลายเดือนก่อน

    Great Content, please do a follow up with more advance concepts!

  • @surojitmaity2397
    @surojitmaity2397 8 หลายเดือนก่อน

    nice explanation, it helps..

  • @hamzatoubat93
    @hamzatoubat93 2 หลายเดือนก่อน

    You are the best, thank you

    • @h0tPlug1n
      @h0tPlug1n  2 หลายเดือนก่อน

      Thank you 🥹🙏

  • @asantoshkumarachary2692
    @asantoshkumarachary2692 ปีที่แล้ว

    You are a great teacher❤

    • @h0tPlug1n
      @h0tPlug1n  ปีที่แล้ว

      Thank you so very much 💗

  • @optionroots
    @optionroots ปีที่แล้ว +2

    Hi, sabyasachi you did a great Job for beginners who can easily deep drive into APT field , do one thing more just to provide these apk's for download so we did all stuffs as a practice ...thanks for such a great video 😊👌

    • @abhizala
      @abhizala ปีที่แล้ว +2

      Those are available on his GitHub, check for the github profile link in the description, browse the repo.

  • @abhizala
    @abhizala ปีที่แล้ว +2

    Great video, just to let anyone who watches this video know that, singing the app with SHA1 is now deprecated so SHA 2 is recommend, like "jarsigner -verbose -sigalg SHA256withRSA -digestalg SHA-256 -keystore cert.keys unsigned.apk aliasName"

  • @chandrasekharyerragudi8985
    @chandrasekharyerragudi8985 7 หลายเดือนก่อน

    Good information

  • @toplist3257
    @toplist3257 ปีที่แล้ว +5

    Thank you so much for making it available for free brother, people like me have a huge constraint on budget, is there any other material you would recommend for me to study

    • @h0tPlug1n
      @h0tPlug1n  ปีที่แล้ว +4

      I'm just kinda busy with my college works... Once I'm free I am gonna pour a lot into this channel... Every precious thing is going to be free.... But its gonna take some time..

  • @mangeshmatke9
    @mangeshmatke9 4 หลายเดือนก่อน

    Good video bro

  • @hmlokman2005
    @hmlokman2005 2 ปีที่แล้ว +2

    thanks

  • @laxmansinghkasana2
    @laxmansinghkasana2 10 หลายเดือนก่อน +1

    guruji application ki adb proses id kese find kru
    is command se to nhi ho rhi 👉👉adb shell ps | grep -i
    koi tool ho ya koi command ho to btavo plzz

  • @shba9300
    @shba9300 ปีที่แล้ว

    Thanks for the helpful tutorial,
    I just have an issue now I want to test an application within Microsoft dynamics 365 but everytime I try to run the application I get a message says my device is not healthy and rooted. is the emulator unrooted or what can I do I'm lost help me please.

  • @pinky5454
    @pinky5454 9 หลายเดือนก่อน

    Please upload the video for apks analysis with AndroPyTool and Android Studio Emulator.

  • @sudesh6807
    @sudesh6807 ปีที่แล้ว

    are this vulnerability still applicable if we build app with pro-guard and minification enabled?

  • @nandheeshganeshkumar4087
    @nandheeshganeshkumar4087 หลายเดือนก่อน

    hi , i am not able to install the google build android tools

  • @davinder1910singh
    @davinder1910singh 6 หลายเดือนก่อน

    I need help, unable to connect to kali running on vb using adb command. Please help

  • @Cr-zw3mv
    @Cr-zw3mv 3 หลายเดือนก่อน

    Please I want the link of virtualization video

  • @sayaliranaware9746
    @sayaliranaware9746 ปีที่แล้ว

    Hello sabyasachi. Greetings to you! Thanks for this video. Can you make a 2nd part ASAP?? I want to learn about Drozer, QARK, Frida & Objection. Thanks in advance.

    • @h0tPlug1n
      @h0tPlug1n  ปีที่แล้ว +2

      Hi, I've actually received many DMs stating about the same. Once I am done with other workloads I'll definitely make a video out of it. Don't worry there is actually something big going to come for all my viewers. :)

    • @abhiram8398
      @abhiram8398 ปีที่แล้ว

      @@h0tPlug1n Hi. we are still waiting. pls upload it asap

    • @AkshayBhuj
      @AkshayBhuj 9 หลายเดือนก่อน

      still waiting...@@h0tPlug1n

  • @ryoutomo1175
    @ryoutomo1175 ปีที่แล้ว

    hi mr, can you share link download about tools mr?🙏

  • @sudipghevade2937
    @sudipghevade2937 4 หลายเดือนก่อน

    Sir I did not get emulator file in my system can you pls help

  • @vennividdivicci
    @vennividdivicci ปีที่แล้ว

    when i trying adb pull comand on 1:33:00 it says permission denied ?

    • @davinder1910singh
      @davinder1910singh 6 หลายเดือนก่อน

      Alternative you can move the file in sdcard and then pull it.

  • @AmanPatel-rw3fm
    @AmanPatel-rw3fm 2 ปีที่แล้ว +2

    can we get notes ??

    • @h0tPlug1n
      @h0tPlug1n  2 ปีที่แล้ว +2

      sure. I have provided the link in the description box.

    • @AmanPatel-rw3fm
      @AmanPatel-rw3fm 2 ปีที่แล้ว +1

      @@h0tPlug1n thank you and this video was awesome . 🥰

    • @AmanPatel-rw3fm
      @AmanPatel-rw3fm ปีที่แล้ว +1

      Waiting for more dynamic analysis videos.

  • @bhanuchandher3764
    @bhanuchandher3764 หลายเดือนก่อน +1

    is this the full course ?

    • @h0tPlug1n
      @h0tPlug1n  หลายเดือนก่อน +1

      Sadly nope... I am working on making a complete one.. It will take some time.. 😥

    • @bhanuchandher3764
      @bhanuchandher3764 หลายเดือนก่อน

      @@h0tPlug1n What else still remaining?????????????? topics

    • @bhanuchandher3764
      @bhanuchandher3764 หลายเดือนก่อน +1

      @@h0tPlug1n wwhat r the remaining topics ?????????

  • @akki_talks
    @akki_talks 3 หลายเดือนก่อน +2

    1: at 55:01 if MoBSF is not giving link to open it in browser run in different terminal --> pkill gunicorn
    then again run --> ./run.sh
    2: will add if any issue & other solution I get later

  • @laxmansinghkasana2
    @laxmansinghkasana2 10 หลายเดือนก่อน

    guruji application ki adb proses id kese find kru
    is command se to nhi ho rhi 👉👉adb shell ps | grep -i
    koi tool ho ya koi command ho to btavo plzz

  • @laxmansinghkasana2
    @laxmansinghkasana2 10 หลายเดือนก่อน

    guruji application ki adb proses id kese find kru
    is command se to nhi ho rhi 👉👉adb shell ps | grep -i
    koi tool ho ya koi command ho to btavo plzz

  • @laxmansinghkasana2
    @laxmansinghkasana2 10 หลายเดือนก่อน

    guruji application ki adb proses id kese find kru
    is command se to nhi ho rhi 👉👉adb shell ps | grep -i
    koi tool ho ya koi command ho to btavo plzz

  • @laxmansinghkasana2
    @laxmansinghkasana2 10 หลายเดือนก่อน

    guruji application ki adb proses id kese find kru
    is command se to nhi ho rhi 👉👉adb shell ps | grep -i
    koi tool ho ya koi command ho to btavo plzz