8kSec

Offensive Android Internals

Live On-Site / Live Virtual / On-Demand

Master Android Security Internals

Gain comprehensive expertise in Android security, from system architecture to kernel exploitation. Learn reverse engineering, Binder internals, SELinux, rooting, and advanced dynamic instrumentation.

Certified Android Security Researcher Certification

What You Will Learn

This immersive program offers an opportunity to enhance your understanding of Android internals, reverse engineering, and application exploitation. It provides a broad understanding of Android system architecture, covering topics such as Android drivers, modules, the Linux kernel, and the Android Binder. You will gain hands-on experience in reverse engineering, exploit development for the ARM platform, and a deep dive into memory management and related vulnerabilities.

The course covers Android boot, recovery, and rooting processes, along with security features like DAC, capabilities, SECCOMP, and SELinux. For practical learning, the course includes extracting and decrypting boot images, symbolicating the Android kernel, and porting exploits to other Android devices. Advanced Frida techniques including custom tracing, profiling, and memory inspection are explored with real-world applications.

Case studies on prominent malware and custom malware samples shed light on reverse engineering and advanced forensics techniques. Application security vulnerabilities arising from Android components are also covered, alongside hands-on exercises using vulnerable applications created for the course and a range of real-world application vulnerabilities.

Key Objectives

  • Understand Android system architecture, drivers, and the Linux kernel
  • Master the Android Binder IPC mechanism
  • Learn DAC, capabilities, SECCOMP, and SELinux security models
  • Reverse engineer Android applications using Smali and Dex analysis
  • Defeat obfuscation and anti-analysis techniques
  • Exploit accessibility service abuse and malware reversing
  • Perform static and dynamic analysis of Android applications
  • Bypass root detection and SSL pinning
  • Master Frida for Android hooking, tracing, and memory manipulation
  • Build and customize the Android kernel for vulnerability research
  • Perform kernel debugging and privilege escalation
  • Become a Certified Android Security Researcher (CASR)

All our live trainings are highly customizable. We can tailor the content to cover topics specific to your team's needs. Contact us for more details.

Syllabus

Module 1: Android Architecture & Security +
  • Android system architecture overview
  • Android drivers and modules
  • Linux kernel foundations for Android
  • Android Binder IPC mechanism
  • DAC and Linux capabilities
  • SECCOMP filters and policies
  • SELinux architecture and enforcement
Module 2: Android Application Fundamentals +
  • APK structure and components
  • Android application components (Activities, Services, Receivers, Providers)
  • Permission model and flaws
  • Application signing
  • ADB and the Android filesystem
  • Attack surfaces for Android applications
Module 3: Reversing Android Applications +
  • Reverse engineering process and tools
  • Smali learning and Dex analysis
  • Obfuscation detection and defeat
  • Accessibility service exploitation
  • Malware reversing and case studies
  • Patching and hooking Android applications
Module 4: Static & Dynamic Analysis +
  • Proxying Android traffic
  • Local storage and weak cryptography exploitation
  • Content provider path traversal and info leakage
  • Root detection and SSL pinning bypass techniques
  • Firebase, NDK, and game hacking
  • Deep links and WebView exploitation
  • Flutter application exploitation
Module 5: Frida for Android +
  • Hooking Java and Kotlin methods
  • Class and method dumping
  • Memory manipulation and in-memory tampering
  • Native code instrumentation
  • Using Frida on non-rooted Android devices
  • Advanced tracing and profiling techniques
Module 6: Android Kernel & System Security +
  • Android boot process and bootloader interaction
  • Building and customizing the Android kernel
  • Android rooting process
  • Kernel debugging and binary analysis
  • Kernel exploitation and privilege escalation
  • SELinux policy analysis and bypass
  • Kernel protection mechanisms and bypasses

Prerequisites

To successfully participate in this course, attendees should possess the following:

  • Working knowledge of cybersecurity fundamentals
  • Basic Android familiarity
  • Basic Linux command-line proficiency
  • Understanding of Java/Kotlin basics helpful

Certified Android Security Researcher (CASR)

Prepare for the CASR certification exam validating your mastery of Android internals, AOSP, kernel security, and advanced exploitation.

EXAM DURATION: 24 Hours

Learn More
Certified Android Security Researcher

Duration

3 Days

Ways To Learn

  • On Demand
  • Live Virtual
  • Live On-Site

Who Should Attend?

Security researchers, penetration testers, Android developers, and anyone seeking deep Android security knowledge.

Laptop Requirements

  • Laptop with 8+ GB RAM and 40 GB hard disk space
  • Students will be provided with access to cloud lab instances
  • Administrative access on the system
  • Detailed setup instructions sent before the course
Send Enquiry

Trusted Training Providers

Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.

Training session 1
Training session 2
Training session 3
Training session 4
Training session 5
Training session 6
Training session 7
Training session 8

Take Your Skills To The Next Level

Our Modes Of Training

On Demand

Learn at your own pace

Perfect for Self-Paced Learners

  • Immediate access to materials
  • Lecture recordings and self-assessments
  • 365 days of access
  • Certificate of completion
  • Dedicated email support
  • Certification exam
Learn More

Live Virtual

Get in touch for pricing

Perfect for Teams in Multiple Locations

  • Real-time interaction with expert trainers via Zoom
  • Customizable content for your team
  • Continued support after training
  • Certification exam
Send Enquiry

Live On-Site

Get in touch for pricing

Perfect for Teams in One Location

  • Real-time interaction at your onsite location
  • Customizable content for your team
  • Continued support after training
  • Certification exam
Send Enquiry

FAQ

The information on this page is subject to change without notice.

Contact Us

Have a question or want to learn more about this training? Get in touch with us.

Our Location

51 Pleasant St # 843, Malden, MA, US, 02148

General Inquiries

contact@8ksec.io

Trainings

training@8ksec.io

Send Enquiry