UMBC Training Centers logo

Android Security & Exploitation

 

Course Description | Outline | Cybersecurity Training | IT Training

Outline

Introduction

  • Android Introduction
  • History
  • Android Versions

The Stack

  • Stack Overview
  • Linux
  • Native Libraries
  • Dalvik
  • Application Framework
  • Android Startup: Booting
  • Android Runtime

Quickstart

  • Installing the Android SDK
  • Making a Simple Hello World Program
  • The Emulator

Installing Custom Roms

  • Manipulating the Android File System
  • Backup Android
  • Different Rooting Methods
  • Installing Roms
  • Sideloading Apps

Android File System Access and Structure

  • Android File System Access Through Terminal Program
  • Android File System Access Through Eclipse
  • SQLite Manager
  • SMS.DB
  • Address Book Database
  • Call History Database
  • Voicemail
  • Other Directories

Applications

  • Eclipse
  • Android ADT-Plugin
  • Using the Android Emulator

Main Building Blocks

  • Intents
  • Services
  • Content Providers
  • Broadcast Receivers
  • Application Context

Programming in Android Overview (Yamba Lab)

  • The Yamba Application
  • Project Design
  • Android User Interface
  • Building an Activity
  • Networking and Multithreading
  • Debugging Android Apps
  • Preferences, Filesystems, Options and Intents
  • The Activity
  • Base Activity
  • Android User Interface
    • Declarative UI
    • Programmatic UI
    • Views and Layouts
    • Logging
    • UI Events
    • Color and Graphics
    • Optimizing the UI
     
     
  • Permissions
    • Adding Custom Permissions
    • Declaring Permissions
    • Enforcing Permissions Dynamically
    • Updating Services to Enforce Permissions

Databases

  • SQL Light
  • DB Helper
  • The Database Schema
  • DB Operations
  • Cursors
  • JSON Objects

Pirates of the Amason

  • Introduction
  • Set Up
  • Exercise
  • Conclusion

Call of Android: Mobile Enterprise Warfare

  • Introduction
  • Set Up
  • Exercise
  • Conclusion

The Trolling Android

  • Introduction
  • Set Up
  • Exercise
  • Conclusion

Attacking Android

  • Introduction
  • Set Up
  • Exercise
  • Conclusion

Advanced Android Forensics

  • Extracting Text Messages
  • Extracting Address Books
  • Extracting Voicemails
  • Extracting Browser History