Support

  • Call Us: +91-9497272625
  • Customer Support
OpSecX Navigation

OpSecX

Online Security Education Platform

Home

Shopping Cart

  • $0.00 0 items

Main Menu

  • About
  • Online Security Courses
    • View All Courses
    • Automated Mobile Application Security Assessment with MobSF
    • Android Security Tools Expert
    • XSSing JavaScript-MVC Applications
    • Cross Site Scripting (XSS) Attacks for Pentesters
    • Node.js Security: Pentesting and Exploitation
    • WebSecNinja: Lesser Known WebAttacks
    • Windows Exploit Development Megaprimer
  • Live Training
    • WebSecNinja 2.0 Live Edition
    • AndroSecNinja Live Edition
    • Pentesting modern day application technology stack
  • Security Books
  • Blog
  • My Account
    • My Courses
    • Dashboard
    • Log In
Return to Content

Introduction

Please purchase the course before starting the lesson.

Lesson tags: introduction to mobsf, mobile security framework, mobsf
Getting Mobile Security Framework
Back to: Automated Mobile Application Security Assessment – MAS > Introduction to Mobile Security Framework - MobSF

Automated Mobile Application Security Assessment – MAS

  • Next
  • Introduction to Mobile Security Framework - MobSF

  • Introduction
  • Getting Mobile Security Framework
  • What makes Mobile Security Framework Unique
  • Basic Requirements to Run MobSF
  • Performing Static Analysis with MobSF

  • Overview: Static Analysis
  • Configuring MobSF for Static Analysis
  • Static Analysis in Android Binaries and Source Code
  • Performing Static Analysis on Android Binaries
  • Performing Static Analysis on Android Source Code
  • Static Analysis in iOS Binaries and Source Code
  • Performing Static Analysis on iOS Binaries
  • Performing Static Analysis on iOS Source Code
  • Configuring Windows VM for Windows Mobile App Static Analysis
  • Performing Dynamic Analysis with MobSF

  • Overview: Dynamic Analyzer
  • Dynamic Analysis in Android Binaries
  • Configuring MobSF for Dynamic Analysis of Android Binaries
  • Performing Dynamic Analysis of Android Binaries with MobSF
  • Case Studies

  • Android Malware Analysis
  • AppLock MITM Password Reset Vulnerability
  • Exploiting AppLock Vulnerability
  • Bypassing Pin in Whisper Android Application
  • Exploiting Whisper App Vulnerability
  • Course Materials

  • Course Slides
  • Materials

Copyright © 2017. All Rights Reserved.

OpSecX. | An OpenSecurity Initiative

Privacy Policy | Terms and Conditions | Customer Support | Security