< NULLCON 2025 - GOA />

About The Training

GO BACK

< Training Title />

Hacking Android Applications

< Training Schedule />

Start Date: Mar 03, 2025

End Date: Mar 05, 2025

< Training Venue />

Venue: TBA

< Training Objectives />

This course is tailored for individuals seeking to elevate their expertise in Android Application Security. It offers an in-depth look at real-world penetration testing, extending beyond the OWASP Top 10 to cover hands-on techniques for bypassing security checks encountered in actual applications. Through practical exercises and real-world scenarios, this training prepares attendees to handle the complex challenges faced while pen-testing modern Android applications.

< Training Level />

Basic - Intermediate 

< Training Outlines />

Day 1 begins with the first module which contains an Introduction to Android Internals, where participants will explore Android’s architecture, file system, security models, permissions, and key tools like ADB. The module also covers the essentials of APK compilation (how APKs are compiled, this can aid in understanding decompilation more easily) and Android application internals. Following this, the second module will help set up the Pentest Environment, set up an emulator/physical device, and walk participants through configuring tools such as APKTool, JadX, and BurpSuite, which are essential for Static and Dynamic analysis of Android applications.

Day 2 begins with Reverse Engineering, the module helps participants gain insights on Reversing Android applications. Starting with the fundamentals of Reverse Engineering, opening APKs with JadX-GUI, and a basic understanding of Smali syntax. Participants will also learn how to bypass key security measures like Root Detection, and Emulator Detection, by Smali modification and understand various countermeasures such as Code Obfuscation and Google Play integrity to defend against this. Post this, The Runtime Analysis module will introduce Frida, a powerful dynamic instrumentation toolkit. It will cover how to set up Frida, how Frida works internally, and demonstrate techniques for bypassing Root detection and SSL pinning using Frida scripts. Participants will also be introduced to Runtime Application Self-Protection (RASP) libraries, helping them gain a solid understanding of RASP detection in mobile applications from a defensive standpoint.

Day 3 starts with the introduction of OWASP Mobile Security Testing Guide (MASTG) and Mobile Application Security Verification Standard (MASVS), this will help participants establish a learning path that they can later use to develop a comprehensive test plan in preparation for a penetration test. The training concludes with a Hands-On Challenge, where participants get to choose an application of their choice and apply their knowledge in practical scenarios to bypass client-side protections such as Root Detection, SSL pinning, etc.

< WHAT TO BRING? />

  • Laptop with at least 16 GB RAM (Windows Preferred)
  • Administrator access in Windows (for Installation of tools)
  • Virtualization Enabled in BIOS
  • 50 GB of free disk space
  • Burpsuite installed (for dynamic analysis)

< Training PREREQUISITE />

  • Basic Knowledge of Java
  • Basic understanding of the Android Operating System
  • Java and JDK installed on the system

< WHO SHOULD ATTEND? />

  • Penetration Testers
  • People who want to get started with Mobile Application Security
  • Anyone curious about hacking and securing Android applications

< WHAT TO EXPECT? />

  • Understanding the basics of Android Penetration Testing
  • Hands-on practice on Reverse Engineering Applications
  • Hands-on practice on Bypass Client-Side checks such as Root Detection, SSL Pinning, etc.
  • Hands-on practice on Runtime Manipulation
  • Post Training Documentation 

< WHAT ATTENDEES WILL GET? />

  • Course slides and notes
  • APK files for Hands-On Practice
  • Post-training reference material

< WHAT NOT TO EXPECT? />

  • Being an expert in three days
  • Android Application Development

< About the Trainer />

Ali Jujara is a Senior Security Consultant who leads the Mobile Application Security Team at Payatu. With over five years of experience in Mobile Application Security, he specializes in both Android and iOS application penetration testing, he is also well-versed in Web Application Security and Code Reviews, bringing extensive industry expertise to his role.

He is currently researching RASP (Runtime Application Self-Protection) libraries and helping companies improve their detection signatures, contributing to advancements in application defense mechanisms. Additionally, he is a skilled trainer who has delivered training sessions on Mobile AppSec for various clients overseas and has presented talks at local chapters such as Null Pune and OWASP Pune. In his spare time, he leads the Null chapter in Pune, which is a community for security enthusiasts that hosts talks and offers opportunities for networking under one roof.