Offensive Mobile Malware Analysis
Live On-Site / Live Virtual
Hands-On Mobile Malware Analysis Training
Learn to analyze iOS and Android malware using cutting-edge tools and techniques. Cover static, dynamic, and behavioral analysis with real-world malware samples.
What You Will Learn
This course equips you with the skills to analyze mobile malware across both iOS and Android platforms. You will learn to identify malware infection vectors, understand evasion techniques used by modern mobile threats, and apply static and dynamic analysis methods to dissect real-world samples. The training covers the complete malware analysis lifecycle from initial triage to IOC extraction.
On the iOS side, you will perform binary analysis, inspect plist files and entitlements, review code signing artifacts, and conduct runtime analysis using Frida. You will learn to monitor network communications, trace behavioral patterns, and extract indicators of compromise from live malware samples.
For Android malware, you will decompile APKs, analyze manifests and permissions, detect obfuscation patterns, and investigate native code components. Dynamic analysis covers emulator setup, runtime hooking, network traffic capture, accessibility service abuse detection, and C2 communication analysis. The course concludes with advanced topics including automated analysis pipelines and real-world campaign case studies.
Key Objectives
- ✓Understand the mobile malware threat landscape and infection vectors
- ✓Classify malware categories and identify evasion techniques
- ✓Perform static analysis of iOS binaries, plists, and entitlements
- ✓Conduct dynamic iOS malware analysis with Frida
- ✓Monitor network communications and extract IOCs from iOS samples
- ✓Decompile and analyze Android APKs, manifests, and permissions
- ✓Detect obfuscation and analyze native code in Android malware
- ✓Perform dynamic Android analysis with runtime hooking and traffic capture
- ✓Analyze C2 communication patterns and accessibility abuse
- ✓Build custom IOCs and automated analysis pipelines
- ✓Study real-world mobile malware campaign case studies
- ✓Become a Certified Mobile Malware Reverse Engineer (CMMRE)
All our live trainings are highly customizable. We can tailor the content to cover topics specific to your team's needs. Contact us for more details.
Syllabus
Module 1: Mobile Malware Landscape +
- •Mobile malware threat landscape overview
- •Malware categories: spyware, ransomware, banking trojans, RATs
- •Infection vectors and distribution methods
- •Evasion techniques and anti-analysis measures
- •Setting up the malware analysis lab environment
Module 2: iOS Malware Analysis - Static +
- •iOS binary analysis and Mach-O format
- •Plist file inspection and configuration analysis
- •Entitlement review and privilege assessment
- •Code signing verification and anomaly detection
- •Embedded resource extraction and analysis
Module 3: iOS Malware Analysis - Dynamic +
- •Runtime analysis with Frida instrumentation
- •Network communication monitoring and interception
- •Behavioral analysis and system call tracing
- •IOC extraction from live samples
- •Persistence mechanism identification
Module 4: Android Malware Analysis - Static +
- •APK decompilation and resource extraction
- •Manifest analysis and permission review
- •Obfuscation detection and deobfuscation techniques
- •Native code analysis (JNI and .so libraries)
- •String analysis and hardcoded credential detection
Module 5: Android Malware Analysis - Dynamic +
- •Emulator setup and safe execution environment
- •Runtime hooking and method interception
- •Network traffic capture and protocol analysis
- •Accessibility service abuse detection
- •C2 communication analysis and infrastructure mapping
Module 6: Advanced Topics +
- •Custom IOC creation and threat intelligence feeds
- •Automated analysis pipelines and tooling
- •Case study: real-world iOS malware campaign
- •Case study: real-world Android malware campaign
- •Mitigation strategies and defensive recommendations
Prerequisites
To successfully participate in this course, attendees should possess the following:
- • Working knowledge of cybersecurity fundamentals
- • Basic familiarity with iOS and Android platforms
- • Basic command-line proficiency
- • Understanding of reverse engineering concepts helpful but not required
Certified Mobile Malware Reverse Engineer (CMMRE)
Prepare for the CMMRE certification testing your mobile malware analysis skills.
EXAM DURATION: 48 Hours
Learn More
Duration
2 Days
Ways To Learn
- Live Virtual
- Live On-Site
Who Should Attend?
Malware analysts, incident responders, security researchers, and mobile security professionals.
Laptop Requirements
- • Laptop with 8+ GB RAM and 40 GB hard disk space
- • Students will be provided with access to cloud lab instances
- • Administrative access on the system
- • Detailed setup instructions sent before the course
Trusted Training Providers
Our trainers boast more than ten years of experience delivering diverse training sessions at conferences such as Blackhat, HITB, Power of Community, Zer0con, OWASP Appsec, and more.
Take Your Skills To The Next Level
Our Modes Of Training
Live Virtual
Get in touch for pricing
Perfect for Teams in Multiple Locations
- Real-time interaction with expert trainers via Zoom
- Customizable content for your team
- Continued support after training
- Certification exam
Live On-Site
Get in touch for pricing
Perfect for Teams in One Location
- Real-time interaction at your onsite location
- Customizable content for your team
- Continued support after training
- Certification exam
FAQ
The information on this page is subject to change without notice.
Contact Us
Have a question or want to learn more about this training? Get in touch with us.
Our Location
51 Pleasant St # 843, Malden, MA, US, 02148
General Inquiries
contact@8ksec.io
Trainings
training@8ksec.io