Learn advanced fuzzing and exploitation for Android Userland Applications.
Android Userland Fuzzing and Exploitation
Write your awesome label here.
Android Userland Fuzzing and Exploitation
60 days lab + Exam
During this course, you will be introduced to the world of Android user-land exploitation techniques used by threat actors. We will start by covering the basics of ARM64 assembly language and move into reversing the Android Native component to find vulnerabilities. During reverse engineering, we will teach how to find functions that can be harnessed and fuzzed to identify 0day vulnerabilities. You will learn how to analyze crashes found by your fuzzer and finally learn how to exploit them. We will then move on to Android Userland exploitation and will go over the tools that are needed to build reliable and weaponized exploits. We will dive into bypassing different exploit mitigations like NX and ASLR on Android running on ARM64 architecture. At the end of the training, you will be able to identify vulnerabilities using reverse engineering & fuzzing and write complete exploit chains bypassing exploit mitigations.
What's included?
-
9 Modules
-
1 Certification
-
43 Labs
-
Reverse Engineering and Fuzzing
-
Android Userland Exploitation
Advanced Fuzzing Technique
In this course you will learn how to perform vulnerability research on Android Userland applications. During the course you will learn how to identify target functions using reverse engineering to fuzz, and learn how to build fuzzing harnesses for them. The course is focussing on teaching several fuzzing techniques for binaries where source code is available but also more advanced fuzzing techniques like black box coverage guided fuzzing for apps when no source code is available. You will also learn with real world examples on how to use libprotobuf fuzzer to do structure aware fuzzing.
Mobile Exploit Development
After learning how to identify vulnerabilities, you will learn how to build debug and build exploit. In this course we will use multiple vulnerable applications to showcase different vulnerability types like Modern Stack Overflows and Heap Overflow. This course is focusses on teaching how to bypass ASLR and the importance of using info leaks to build a reliable exploit. During the course we will look how exploit delivery methods like Heap Spraying and Heap Massaging/Heap Grooming techniques can be used when exploiting a target to build a weaponized exploit.
Why would you take the course?

What else is included in the package?
That not all! We add Exceptional Value!
Choose your Packages and Instalment Payments!
\Learnworlds\Codeneurons\Pages\ZoneRenderers\CourseCards
Course Lessons
Guaranteed Security using one of the most advanced encrypted systems on the market.
The information in this page is being processed and encrypted securely using industry-leading encryption and fraud prevention tools.
Meet the instructor
Android Userland Fuzzing and Exploitation
Patrick Jones - Course author