Course Overview
Learning Objectives
Understand the Android System Architecture and AOSP source code
Learn about Android Tracing
Grasp Android Boot, Recovery, and Rooting processes
Get an understanding of latest ARM64 instruction set, dynamic memory management and related vulnerabilities on the ARM platform
Acquire skills in ARM Reverse Engineering and exploit development
Learn how to customize and build Android Kernel for Vulnerability Research
Gain knowledge about Android Platform Permission, DAC, CAP, SECCOMP, and SELinux
Develop practical skills in fuzzing applications and processes on Android devices
Overview of Kernel protections and bypasses
Reverse engineering Android binaries (Apps and system binaries)
Get PoC applications to perform 1 click exploits on Mobile apps
Get an intro to common bug various bug categories on Android systems
Learn to audit Android apps for security vulnerabilities
Understand and bypass anti-debugging and obfuscation techniques
Get a detailed walkthrough on using IDA Pro, Hopper, Frida, etc.
Learn how accessibility malwares work, and how to reverse engineer well-known crypto wallet stealers
Learn how to symbolicate the Android kernel
Learn how to extract and decrypt boot images for Android devices
Become a Certified Android Security Researcher (CASR)
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):