Introduction to Android Authentication Architecture, Network communication, Cryptography. Reverse Engineering – Assets and resources, Application mapping with Manifest, Resources. Understanding vulnerabilities – Data Storage (logging sensitive data, insecure file management), Local databases (Encryption, Hashing), External Storage, Authentication (Validation and Authorization), Network API (SSL Certificates, HTTPS), Platform API, Exported Activities, Browsable/Custom Intents, Username enumeration, Broken Cryptography, Insecure Key Management. Traffic Analysis and interpretation. Reverse Engineering and Analyzing Native Libraries. Introduction and hands-on of tools for pentesting – frida, objection, runtime mobile security, MobSF, Adhirit, drozer, burpsuite etc, Identification and Analysis of Android Malware and Spyware. Penetration Test report writing.
Programs
View all programsFrom the news
- AMRITA IQAC Head Inaugurates Indian Knowledge Systems (IKS) National Seminar Sponsored by Indian Council for Philosophical Research (ICPR)
- Amrita School of Pharmacy Professor Visits the University of Iceland
Others
- Green consumers purchase intentions and sustainable consumption of organic food products: a conceptual framework for the Indian middle-class market
- Assessment of ChatGPT Adoption in Remote Emerging Market Locations: Application of a Comprehensive Technology Adoption Model