介绍:
本课程重点介绍 Android 和 iOS 移动应用程序渗透测试。本课程将演示从 Android 和 iOS 应用程序中提取敏感数据(例如 API 密钥、存储的机密和 Firebase 数据库)的常用技术,并为继续担任移动应用程序渗透测试人员的职业生涯提供坚实的基础。本课程将涵盖您可以用来启动 Bug Bounty 移动应用程序的常见方法和实践。
目录:
├── 3. Mastering Mobile Security & Malware Analysis
│ ├── 03 - Goodbye
│ │ ├── 01 - Summary
│ │ │ ├── 01 - Mastering Mobile Security & Malware Analysis Summary _ev.mp4
│ ├── 02 - Modules
│ │ ├── 07 - Building Secure Apps
│ │ │ ├── 01 - Secure Mobile Development & DevSecOps _ev.mp4
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-010_quiz_solved.txt
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-010_quiz_notsolved.txt
│ │ ├── 08 - The Road Ahead
│ │ │ ├── 01 - Future Trends in Mobile Security _ev.mp4
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-011_quiz_solved.txt
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-011_quiz_notsolved.txt
│ │ ├── 03 - Breaking Through Security Barriers
│ │ │ ├── 03 - Insecure Authentication_ Test Feature
│ │ │ ├── 05 - Code Obfuscation & De-obfuscation - Part 2 _ev.mp4
│ │ │ ├── 04 - Code Obfuscation & De-obfuscation - Part 1 _ev.mp4
│ │ │ ├── 01 - Bypassing Advanced Security Mechanisms _ev.mp4
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-005_quiz_solved.txt
│ │ │ ├── 06 - vod-5618-mastering-mobile-sec-malware-analysis-006b_quiz_notsolved.txt
│ │ │ ├── 06 - vod-5618-mastering-mobile-sec-malware-analysis-006b_quiz_solved.txt
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-005_quiz_notsolved.txt
│ │ │ ├── 03 - Insecure Authentication_ Test Feature.json
│ │ │ ├── 03 - Insecure Authentication_ Test Feature.html
│ │ ├── 05 - Mobile Threats
│ │ │ ├── 03 - Traffic Inspection with Burp
│ │ │ ├── 01 - Mobile Malware Analysis _ev.mp4
│ │ │ ├── 03 - Traffic Inspection with Burp.html
│ │ │ ├── 03 - Traffic Inspection with Burp.json
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-008_quiz_solved.txt
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-008_quiz_notsolved.txt
│ │ ├── 06 - Embedded Systems
│ │ │ ├── 01 - Penetration Testing on Smart TVs & Embedded Mobile OS Devices _ev.mp4
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-009_quiz_solved.txt
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-009_quiz_notsolved.txt
│ │ ├── 04 - Hybrid & WebView Security
│ │ │ ├── 01 - Hybrid, Cross-Platform & WebView-Based App Security _ev.mp4
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-007_quiz_notsolved.txt
│ │ │ ├── 02 - vod-5618-mastering-mobile-sec-malware-analysis-007_quiz_solved.txt
│ │ ├── 02 - Architecture & Runtime
│ │ │ ├── 02 - Mobile Application Runtime Architecture - Part 2 _ev.mp4
│ │ │ ├── 01 - Mobile Application Runtime Architecture - Part 1 _ev.mp4
│ │ │ ├── 03 - vod-5618-mastering-mobile-sec-malware-analysis-004b_quiz_notsolved.txt
│ │ │ ├── 03 - vod-5618-mastering-mobile-sec-malware-analysis-004b_quiz_solved.txt
│ │ ├── 01 - Foundations of Mobile Application Security
│ │ │ ├── 03 - Your Reverse Engineering Arsenal _ev.mp4
│ │ │ ├── 01-INT~1_ev.mp4
│ ├── 01 - Welcome
│ │ ├── 01 - Overview
│ │ │ ├── 01 - Mastering Mobile Security & Malware Analysis Overview _ev.mp4
│ ├── INE-Mastering-Mobile-Security-and-Malware-Analysis-Course-File.zip
│ ├── mastering-mobile-security-malware-analysis.json
├── 2. Mobile Application Penetration Testing Techniques
│ ├── 09 - Goodbye
│ │ ├── 01 - Summary
│ │ │ ├── 01 - Mobile Application Penetration Testing Techniques Summary _ev.mp4
│ ├── 08 - Other
│ │ ├── 01 - Other Techniques
│ │ │ ├── 07 - iOS_ Insufficient Cryptography
│ │ │ ├── 08 - Reporting & Recommendations _ev.mp4
│ │ │ ├── 03 - Testing Security Features & Protections _ev.mp4
│ │ │ ├── 05 - Full Workflow & Engagement Simulation _ev.mp4
│ │ │ ├── 01 - Advanced Runtime Attack Techniques _ev.mp4
│ │ │ ├── 06 - vod-5617-mobile-app-pen-test-tech-031_quiz_notsolved.txt
│ │ │ ├── 07 - iOS_ Insufficient Cryptography.html
│ │ │ ├── 07 - iOS_ Insufficient Cryptography.json
│ │ │ ├── 09 - vod-5617-mobile-app-pen-test-tech-032_quiz_solved.txt
│ │ │ ├── 09 - vod-5617-mobile-app-pen-test-tech-032_quiz_notsolved.txt
│ │ │ ├── 06 - vod-5617-mobile-app-pen-test-tech-031_quiz_solved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-029_quiz_notsolved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-029_quiz_solved.txt
│ │ │ ├── 04 - vod-5617-mobile-app-pen-test-tech-030_quiz_solved.txt
│ │ │ ├── 04 - vod-5617-mobile-app-pen-test-tech-030_quiz_notsolved.txt
│ ├── 06 - iOS
│ │ ├── 01 - iOS Dynamic Testing
│ │ │ ├── 01 - Introduction to iOS Dynamic Testing _ev.mp4
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-024_quiz_notsolved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-024_quiz_solved.txt
│ ├── 04 - MASVS
│ │ ├── 01 - Mobile Application Security Verification Standard (MASVS)
│ │ │ ├── 01-MAP~1_ev.mp4
│ ├── 07 - API
│ │ ├── 01 - API & Backend Testing for Mobile Apps
│ │ │ ├── 13 - JWT Token Manipulation
│ │ │ ├── 14 - Insecure Token Management
│ │ │ ├── 06 - API IDOR in Android
│ │ │ ├── 08 - Insecure Auth 2
│ │ │ ├── 09 - API Fuzzing
│ │ │ ├── 03 - API BFLA in Android
│ │ │ ├── 07 - API Demo _ev.mp4
│ │ │ ├── 11 - API Tokens _ev.mp4
│ │ │ ├── 04 - API Pentesting _ev.mp4
│ │ │ ├── 01-INT~1_ev.mp4
│ │ │ ├── 12 - vod-5617-mobile-app-pen-test-tech-028_quiz_notsolved.txt
│ │ │ ├── 13 - JWT Token Manipulation.html
│ │ │ ├── 12 - vod-5617-mobile-app-pen-test-tech-028_quiz_solved.txt
│ │ │ ├── 14 - Insecure Token Management.html
│ │ │ ├── 13 - JWT Token Manipulation.json
│ │ │ ├── 14 - Insecure Token Management.json
│ │ │ ├── 05 - vod-5617-mobile-app-pen-test-tech-026_quiz_notsolved.txt
│ │ │ ├── 08 - Insecure Auth 2.json
│ │ │ ├── 06 - API IDOR in Android.html
│ │ │ ├── 08 - Insecure Auth 2.html
│ │ │ ├── 05 - vod-5617-mobile-app-pen-test-tech-026_quiz_solved.txt
│ │ │ ├── 06 - API IDOR in Android.json
│ │ │ ├── 10 - vod-5617-mobile-app-pen-test-tech-027_quiz_solved.txt
│ │ │ ├── 09 - API Fuzzing.json
│ │ │ ├── 10 - vod-5617-mobile-app-pen-test-tech-027_quiz_notsolved.txt
│ │ │ ├── 09 - API Fuzzing.html
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-025_quiz_notsolved.txt
│ │ │ ├── 03 - API BFLA in Android.html
│ │ │ ├── 03 - API BFLA in Android.json
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-025_quiz_solved.txt
│ ├── 05 - Android
│ │ ├── 01 - Android Dynamic Testing
│ │ │ ├── 20 - Sensitive Information Leakage
│ │ │ ├── 15 - Mobile Vulnerabilities_ SQLi in Android
│ │ │ ├── 12 - API SQLi in Android
│ │ │ ├── 07 - Insecure Logging
│ │ │ ├── 21 - Split APKs _ev.mp4
│ │ │ ├── 16 - Drozer _ev.mp4
│ │ │ ├── 18 - APK MitM _ev.mp4
│ │ │ ├── 13 - XSS SQLi _ev.mp4
│ │ │ ├── 05 - Logcat _ev.mp4
│ │ │ ├── 10 - SQLite _ev.mp4
│ │ │ ├── 03 - Android Debug Bridge _ev.mp4
│ │ │ ├── 08 - Files _ev.mp4
│ │ │ ├── 01 - Introduction to Android Dynamic Testing _ev.mp4
│ │ │ ├── 22 - vod-5617-mobile-app-pen-test-tech-023_quiz_notsolved.txt
│ │ │ ├── 22 - vod-5617-mobile-app-pen-test-tech-023_quiz_solved.txt
│ │ │ ├── 20 - Sensitive Information Leakage.html
│ │ │ ├── 20 - Sensitive Information Leakage.json
│ │ │ ├── 14 - vod-5617-mobile-app-pen-test-tech-020_quiz_notsolved.txt
│ │ │ ├── 12 - API SQLi in Android.html
│ │ │ ├── 15 - Mobile Vulnerabilities_ SQLi in Android.json
│ │ │ ├── 19 - vod-5617-mobile-app-pen-test-tech-022_quiz_notsolved.txt
│ │ │ ├── 14 - vod-5617-mobile-app-pen-test-tech-020_quiz_solved.txt
│ │ │ ├── 17 - vod-5617-mobile-app-pen-test-tech-021_quiz_solved.txt
│ │ │ ├── 12 - API SQLi in Android.json
│ │ │ ├── 19 - vod-5617-mobile-app-pen-test-tech-022_quiz_solved.txt
│ │ │ ├── 15 - Mobile Vulnerabilities_ SQLi in Android.html
│ │ │ ├── 17 - vod-5617-mobile-app-pen-test-tech-021_quiz_notsolved.txt
│ │ │ ├── 09 - vod-5617-mobile-app-pen-test-tech-018_quiz_solved.txt
│ │ │ ├── 11 - vod-5617-mobile-app-pen-test-tech-019_quiz_notsolved.txt
│ │ │ ├── 06 - vod-5617-mobile-app-pen-test-tech-017_quiz_solved.txt
│ │ │ ├── 07 - Insecure Logging.html
│ │ │ ├── 09 - vod-5617-mobile-app-pen-test-tech-018_quiz_notsolved.txt
│ │ │ ├── 06 - vod-5617-mobile-app-pen-test-tech-017_quiz_notsolved.txt
│ │ │ ├── 07 - Insecure Logging.json
│ │ │ ├── 04 - vod-5617-mobile-app-pen-test-tech-016_quiz_notsolved.txt
│ │ │ ├── 04 - vod-5617-mobile-app-pen-test-tech-016_quiz_solved.txt
│ │ │ ├── 11 - vod-5617-mobile-app-pen-test-tech-019_quiz_solved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-015_quiz_solved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-015_quiz_notsolved.txt
│ ├── 01 - Welcome
│ │ ├── 01 - Overview
│ │ │ ├── 01 - Mobile Application Penetration Testing Techniques Overview _ev.mp4
│ ├── 02 - Introduction
│ │ ├── 02 - Lab Setup
│ │ │ ├── 01 - Lab Setup for Dynamic Testing _ev.mp4
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-003_quiz_solved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-003_quiz_notsolved.txt
│ │ ├── 01 - Methodology
│ │ │ ├── 01 - Introduction & Methodology _ev.mp4
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-002_quiz_solved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-002_quiz_notsolved.txt
│ ├── 03 - OWASP
│ │ ├── 01 - OWASP Mobile Top 10 Vulnerabilities
│ │ │ ├── 26 - Insecure Auth 1
│ │ │ ├── 23 - Insecure Data Storage
│ │ │ ├── 20 - Testing Debuggability
│ │ │ ├── 17 - Insecure Biometric Failover
│ │ │ ├── 12 - Insecure Network Transmission
│ │ │ ├── 09 - Mobile Vulnerabilities_ XSS in Android
│ │ │ ├── 07 - M4_ Insufficient Input
│ │ │ ├── 05 - M3_ Insecure Authentication
│ │ │ ├── 24 - M10_ Insufficient Cryptography _ev.mp4
│ │ │ ├── 21 - M9_ Insecure Data Storage _ev.mp4
│ │ │ ├── 18 - M8_ Security Misconfiguration _ev.mp4
│ │ │ ├── 15 - M7_ Insufficient Binary Protection _ev.mp4
│ │ │ ├── 13 - M6_ Inadequate Privacy Controls _ev.mp4
│ │ │ ├── 10 - M5_ Insecure Communication _ev.mp4
│ │ │ ├── 03 - M2_ Inadequate Supply Chain Security _ev.mp4
│ │ │ ├── 01 - M1_ Improper Credential Usage _ev.mp4
│ │ │ ├── 22 - vod-5617-mobile-app-pen-test-tech-012_quiz_notsolved.txt
│ │ │ ├── 25 - vod-5617-mobile-app-pen-test-tech-013_quiz_notsolved.txt
│ │ │ ├── 26 - Insecure Auth 1.json
│ │ │ ├── 22 - vod-5617-mobile-app-pen-test-tech-012_quiz_solved.txt
│ │ │ ├── 26 - Insecure Auth 1.html
│ │ │ ├── 25 - vod-5617-mobile-app-pen-test-tech-013_quiz_solved.txt
│ │ │ ├── 23 - Insecure Data Storage.json
│ │ │ ├── 23 - Insecure Data Storage.html
│ │ │ ├── 16 - vod-5617-mobile-app-pen-test-tech-010_quiz_notsolved.txt
│ │ │ ├── 14 - vod-5617-mobile-app-pen-test-tech-009_quiz_notsolved.txt
│ │ │ ├── 19 - vod-5617-mobile-app-pen-test-tech-011_quiz_notsolved.txt
│ │ │ ├── 17 - Insecure Biometric Failover.html
│ │ │ ├── 19 - vod-5617-mobile-app-pen-test-tech-011_quiz_solved.txt
│ │ │ ├── 17 - Insecure Biometric Failover.json
│ │ │ ├── 20 - Testing Debuggability.json
│ │ │ ├── 16 - vod-5617-mobile-app-pen-test-tech-010_quiz_solved.txt
│ │ │ ├── 14 - vod-5617-mobile-app-pen-test-tech-009_quiz_solved.txt
│ │ │ ├── 20 - Testing Debuggability.html
│ │ │ ├── 06 - vod-5617-mobile-app-pen-test-tech-006_quiz_notsolved.txt
│ │ │ ├── 08 - vod-5617-mobile-app-pen-test-tech-007_quiz_notsolved.txt
│ │ │ ├── 11 - vod-5617-mobile-app-pen-test-tech-008_quiz_notsolved.txt
│ │ │ ├── 09 - Mobile Vulnerabilities_ XSS in Android.json
│ │ │ ├── 09 - Mobile Vulnerabilities_ XSS in Android.html
│ │ │ ├── 12 - Insecure Network Transmission.json
│ │ │ ├── 12 - Insecure Network Transmission.html
│ │ │ ├── 08 - vod-5617-mobile-app-pen-test-tech-007_quiz_solved.txt
│ │ │ ├── 11 - vod-5617-mobile-app-pen-test-tech-008_quiz_solved.txt
│ │ │ ├── 06 - vod-5617-mobile-app-pen-test-tech-006_quiz_solved.txt
│ │ │ ├── 04 - vod-5617-mobile-app-pen-test-tech-005_quiz_notsolved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-004_quiz_notsolved.txt
│ │ │ ├── 04 - vod-5617-mobile-app-pen-test-tech-005_quiz_solved.txt
│ │ │ ├── 02 - vod-5617-mobile-app-pen-test-tech-004_quiz_solved.txt
│ ├── INE-Mobile-Application-Penetration-Testing-Techniques-Course-File.zip
│ ├── mobile-application-penetration-testing-techniques.json
├── 1. Introduction to Mobile Application Security
│ ├── 01 - Course
│ │ ├── 09 - Summary
│ │ │ ├── 01 - Summary of Mobile Application Security Summary _ev.mp4
│ │ ├── 08 - Reporting and Mitigation
│ │ │ ├── 01 - Reporting _ev.mp4
│ │ │ ├── 02 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_040_quiz_notsolved.txt
│ │ │ ├── 02 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_040_quiz_solved.txt
│ │ ├── 07 - Mobile Application Penetration Static Analysis
│ │ │ ├── 17 - Static Analysis Demo _ev.mp4
│ │ │ ├── 15 - A Few Other Examples _ev.mp4
│ │ │ ├── 13 - Third-Party Data Sharing _ev.mp4
│ │ │ ├── 11 - Insecure Network Communication _ev.mp4
│ │ │ ├── 09 - Weak Cryptography _ev.mp4
│ │ │ ├── 07 - Insecure Storage _ev.mp4
│ │ │ ├── 05 - Insecure Logging _ev.mp4
│ │ │ ├── 03 - Hardcoded Secrets _ev.mp4
│ │ │ ├── 01-REC~1_ev.mp4
│ │ ├── 06 - OWASP Mobile Top 10
│ │ │ ├── 07 - M3_ Insecure Authentication
│ │ │ ├── 09 - M4_ Insufficient Input
│ │ │ ├── 21 - M10_ Insufficient Cryptography _ev.mp4
│ │ │ ├── 19 - M9_ Insecure Data Storage _ev.mp4
│ │ │ ├── 17 - M8_ Security Misconfiguration _ev.mp4
│ │ │ ├── 15 - M7_ Insufficient Binary Protection _ev.mp4
│ │ │ ├── 13 - M6_ Inadequate Privacy Controls _ev.mp4
│ │ │ ├── 11 - M5_ Insecure Communication _ev.mp4
│ │ │ ├── 03 - M1_ Improper Credential Usage _ev.mp4
│ │ │ ├── 05 - M2_ Inadquate Supply Chain Security _ev.mp4
│ │ │ ├── 01 - Overview of Mobile Application Vulnerabilities _ev.mp4
│ │ │ ├── 20 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_029_quiz_notsolved.txt
│ │ │ ├── 16 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_027_quiz_notsolved.txt
│ │ │ ├── 22 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_030_quiz_notsolved.txt
│ │ │ ├── 18 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_028_quiz_notsolved.txt
│ │ │ ├── 18 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_028_quiz_solved.txt
│ │ │ ├── 20 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_029_quiz_solved.txt
│ │ │ ├── 22 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_030_quiz_solved.txt
│ │ │ ├── 16 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_027_quiz_solved.txt
│ │ │ ├── 08 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_023_quiz_notsolved.txt
│ │ │ ├── 14 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_026_quiz_notsolved.txt
│ │ │ ├── 06 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_022_quiz_notsolved.txt
│ │ │ ├── 10 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_024_quiz_notsolved.txt
│ │ │ ├── 12 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_025_quiz_notsolved.txt
│ │ │ ├── 06 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_022_quiz_solved.txt
│ │ │ ├── 08 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_023_quiz_solved.txt
│ │ │ ├── 14 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_026_quiz_solved.txt
│ │ │ ├── 12 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_025_quiz_solved.txt
│ │ │ ├── 10 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_024_quiz_solved.txt
│ │ │ ├── 02 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_020_quiz_notsolved.txt
│ │ │ ├── 04 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_021_quiz_notsolved.txt
│ │ │ ├── 02 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_020_quiz_solved.txt
│ │ │ ├── 04 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_021_quiz_solved.txt
│ │ ├── 05 - Application Security
│ │ │ ├── 05 - Threat Modeling _ev.mp4
│ │ │ ├── 03 - Introduction to Threat Modeling _ev.mp4
│ │ │ ├── 01 - Secure App Development _ev.mp4
│ │ │ ├── 02 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_017_quiz_notsolved.txt
│ │ │ ├── 04 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_018_quiz_notsolved.txt
│ │ │ ├── 06 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_019_quiz_notsolved.txt
│ │ │ ├── 02 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_017_quiz_solved.txt
│ │ │ ├── 04 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_018_quiz_solved.txt
│ │ │ ├── 06 - VOD-5616_Introduction%20to%20Mobile%20Application%20Security_019_quiz_solved.txt
│ │ ├── 04 - Understanding the iOS Platform
│ │ │ ├── 03 - Acquiring IPA Files _ev.mp4
│ │ │ ├── 05 - The Info.plist File _ev.mp4
│ │ │ ├── 01 - iOS & App Components _ev.mp4
│ │ ├── 03 - Understanding the Android Platform
│ │ │ ├── 01 - The Android Platform _ev.mp4
│ │ │ ├── 13 - Reading Android Manifest Files _ev.mp4
│ │ │ ├── 03 - Android Security Features _ev.mp4
│ │ │ ├── 09 - Android App Components _ev.mp4
│ │ │ ├── 11 - Andriod Manifest Analysis Methodology _ev.mp4
│ │ │ ├── 07 - Open APK Files _ev.mp4
│ │ │ ├── 05 - Download APK Files _ev.mp4
│ │ ├── 02 - Introduction to Mobile Application Security
│ │ │ ├── 03 - Definitions_ Different Kinds of Mobile Apps _ev.mp4
│ │ │ ├── 09-COM~1_ev.mp4
│ │ │ ├── 05-MOB~1_ev.mp4
│ │ │ ├── 07 - The Penetration Testing Process _ev.mp4
│ │ │ ├── 01 - Mobile Application Security Challenges _ev.mp4
│ │ ├── 01 - Overview
│ │ │ ├── 01 - Introduction to Mobile Application Security Overview _ev.mp4
│ ├── introduction-to-mobile-application-security.json
│ ├── Introduction_to_Mobile_Application_Security.pdf
预览:


© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
















请登录后查看评论内容