Offensive Android Internals
Live On-Site / Live Virtual / On-Demand
Master Android Security Internals
Gain comprehensive expertise in Android security, from system architecture to kernel exploitation. Learn reverse engineering, Binder internals, SELinux, rooting, and advanced dynamic instrumentation.
What You Will Learn
This immersive program offers an opportunity to enhance your understanding of Android internals, reverse engineering, and application exploitation. It provides a broad understanding of Android system architecture, covering topics such as Android drivers, modules, the Linux kernel, and the Android Binder. You will gain hands-on experience in reverse engineering, exploit development for the ARM platform, and a deep dive into memory management and related vulnerabilities.
The course covers Android boot, recovery, and rooting processes, along with security features like DAC, capabilities, SECCOMP, and SELinux. For practical learning, the course includes extracting and decrypting boot images, symbolicating the Android kernel, and porting exploits to other Android devices. Advanced Frida techniques including custom tracing, profiling, and memory inspection are explored with real-world applications.
Case studies on prominent malware and custom malware samples shed light on reverse engineering and advanced forensics techniques. Application security vulnerabilities arising from Android components are also covered, alongside hands-on exercises using vulnerable applications created for the course and a range of real-world application vulnerabilities.
Key Objectives
- ✓Understand Android system architecture, drivers, and the Linux kernel
- ✓Master the Android Binder IPC mechanism
- ✓Learn DAC, capabilities, SECCOMP, and SELinux security models
- ✓Reverse engineer Android applications using Smali and Dex analysis
- ✓Defeat obfuscation and anti-analysis techniques
- ✓Exploit accessibility service abuse and malware reversing
- ✓Perform static and dynamic analysis of Android applications
- ✓Bypass root detection and SSL pinning
- ✓Master Frida for Android hooking, tracing, and memory manipulation
- ✓Build and customize the Android kernel for vulnerability research
- ✓Perform kernel debugging and privilege escalation
- ✓Become a Certified Android Security Researcher (CASR)
All our live trainings are highly customizable. We can tailor the content to cover topics specific to your team's needs. Contact us for more details.
Syllabus
Module 1: Android Architecture & Security +
- •Android system architecture overview
- •Android drivers and modules
- •Linux kernel foundations for Android
- •Android Binder IPC mechanism
- •DAC and Linux capabilities
- •SECCOMP filters and policies
- •SELinux architecture and enforcement
Module 2: Android Application Fundamentals +
- •APK structure and components
- •Android application components (Activities, Services, Receivers, Providers)
- •Permission model and flaws
- •Application signing
- •ADB and the Android filesystem
- •Attack surfaces for Android applications
Module 3: Reversing Android Applications +
- •Reverse engineering process and tools
- •Smali learning and Dex analysis
- •Obfuscation detection and defeat
- •Accessibility service exploitation
- •Malware reversing and case studies
- •Patching and hooking Android applications
Module 4: Static & Dynamic Analysis +
- •Proxying Android traffic
- •Local storage and weak cryptography exploitation
- •Content provider path traversal and info leakage
- •Root detection and SSL pinning bypass techniques
- •Firebase, NDK, and game hacking
- •Deep links and WebView exploitation
- •Flutter application exploitation
Module 5: Frida for Android +
- •Hooking Java and Kotlin methods
- •Class and method dumping
- •Memory manipulation and in-memory tampering
- •Native code instrumentation
- •Using Frida on non-rooted Android devices
- •Advanced tracing and profiling techniques
Module 6: Android Kernel & System Security +
- •Android boot process and bootloader interaction
- •Building and customizing the Android kernel
- •Android rooting process
- •Kernel debugging and binary analysis
- •Kernel exploitation and privilege escalation
- •SELinux policy analysis and bypass
- •Kernel protection mechanisms and bypasses
Prerequisites
To successfully participate in this course, attendees should possess the following:
- • Working knowledge of cybersecurity fundamentals
- • Basic Android familiarity
- • Basic Linux command-line proficiency
- • Understanding of Java/Kotlin basics helpful
Certified Android Security Researcher (CASR)
Prepare for the CASR certification exam validating your mastery of Android internals, AOSP, kernel security, and advanced exploitation.
EXAM DURATION: 24 Hours
Learn More
Duration
3 Days
Ways To Learn
- On Demand
- Live Virtual
- Live On-Site
Who Should Attend?
Security researchers, penetration testers, Android developers, and anyone seeking deep Android security knowledge.
Laptop Requirements
- • Laptop with 8+ GB RAM and 40 GB hard disk space
- • Students will be provided with access to cloud lab instances
- • Administrative access on the system
- • Detailed setup instructions sent before the course
Trusted Training Providers
Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.
Take Your Skills To The Next Level
Our Modes Of Training
On Demand
Learn at your own pace
Perfect for Self-Paced Learners
- Immediate access to materials
- Lecture recordings and self-assessments
- 365 days of access
- Certificate of completion
- Dedicated email support
- Certification exam
Live Virtual
Get in touch for pricing
Perfect for Teams in Multiple Locations
- Real-time interaction with expert trainers via Zoom
- Customizable content for your team
- Continued support after training
- Certification exam
Live On-Site
Get in touch for pricing
Perfect for Teams in One Location
- Real-time interaction at your onsite location
- Customizable content for your team
- Continued support after training
- Certification exam
FAQ
The information on this page is subject to change without notice.
Contact Us
Have a question or want to learn more about this training? Get in touch with us.
Our Location
51 Pleasant St # 843, Malden, MA, US, 02148
General Inquiries
contact@8ksec.io
Trainings
training@8ksec.io