Exercise 2: Bypassing business logic of a real world app – Identifying the method to hook Please purchase the course before starting the lesson. Lesson tags: android api monitor, android dynamic analysis, android frida hooks, android hooking, android security analysis, dynamic analysis, dynamic analysis of android application, dynamic analysis report, frida, frida hooks, live api monitor, mobile security framework, mobsf, mobsf dynamic analysis, runtime instrumentation, writing frida scripts