Mobile Application Penetration Testing

Learn Mobile Application Hacking for iOS and Android Devices

Training for a team or organization? Contact us about group access.

Practical Bug Bounty

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Intermediate
  • Duration: 9h
  • Access: Included in Membership

Overview

This course focuses on Android and iOS Mobile Application Penetration testing. The course will demonstrate common techniques to extract sensitive data from Android and iOS Application such as API Keys, stored secrets, and firebase databases, and provide a solid foundation for continuing a career as a Mobile Application Penetration Tester. This course will cover the common methodologies and practices you can utilize to start Bug Bounty hunting mobile applications.

Objectives

Apply Pentesting Processes to Mobile Applications:

  • How to follow the Penetration Testing and Mobile Application Penetration Testing Processes

Set Up a Lab for Mobile Application Testing:

  • How to setup a lab environment to analyze both iOS and Android Mobile applications that are pulled directly from the Apple and Google Play Stores

Perform Manual Analysis of Mobile Applications:

  • Manual analysis of Mobile Applications for sensitive information such as URLs, Storage Buckets, Firebase Databases, and other Stored Secret

Use Tools for Automated Analysis of Mobile Apps:

  • Automated analysis of Mobile Applications by using tools like MobSF

Exploit Mobile Applications:

  • How to break SSL Pinning by using Objection and Frida for both iOS and Android
  • The OWASP Top Ten for Mobile
  • How to jailbreak an iOS device

System Requirements

For the Android section of this course the following device requirements will apply:

  • Windows, Linux, or MacOS based machine
  • 16 GB of RAM or more (to run virtual machines as well as emulated devices)
  • At least 250GB of available storage

For the iOS Section of this course the following device requirements will apply:

 

  • MacOS-based Machine (Macbook, Mac Mini, etc.), or Linux-Based machine with at least 16 GB of RAM and 250GB of available storage
  •  Physical iPhone or iPad running iOS 16.x or less (for jailbreaking purposes)

Prerequisites

  • A basic understanding of Web Application or API-based penetration testing
  • Some familiarity with Mobile Application platforms such as iOS and Android (like how to navigate to settings, install applications, etc.) is expected.

Course Curriculum

  • Introduction and Course Resources
    • Course Introduction
    • Course Resources
    • Mobile Pentesting Certification Landscape
    • Device Requirements – Old
    • Device Requirements
    • Course Discord
  • Penetration Testing Process
    • The Penetration Testing Process
    • The Mobile Application Penetration Testing Process
  • Android Intro and Security Architecture
    • Android Security Architecture
    • Application Security and Signing Process
  • Android Lab Setup
    • Windows – JADX-GUI
    • Windows – adb Install
    • Windows – apktool install
    • Windows – Android Studio Install
    • Kali Linux – PimpMyKali (Easy Mode)
    • Kali Linux – adb Install
    • Kali Linux – apktool Install
    • Kali Linux – JADX-GUI Install
    • Kali Linux – Android Studio Install
    • Mac – Brew
    • Mac – JADX-GUI
    • Mac – apktool
    • Mac – Android Studio
    • Emulator Setup & Recommendations (All Platforms)
    • Accessing ADB Shell from a VM/Networked Device
    • Additional Emulator Options Android (Optional)
    • Physical Device Setup (Optional)
    • Common Issue: No Extended Controls
  • Android Static Analysis
    • Pulling an APK From the Google Play Store
    • Intro to Injured Android
    • Android Manifest.xml
    • Manual Static Analysis
    • How to Find Hardcoded Strings
    • Injured Android Static Analysis (Flags 1-4)
    • Enumerating AWS Storage Buckets via Static Analysis
    • Enumerating Firebase Databases via Static Analysis
    • Automated Analysis using MobSF
  • Android Dynamic Analysis
    • Intro to SSL Pinning/Dynamic Analysis
    • Dynamic Analysis using MobSF
    • Burp Suite Install and Overview
    • Burp Suite Setup/Intercept
    • Proxyman Install & Usage
    • Patching Applications Automatically using Objection
    • Patching Applications Manually
    • Dynamic Analysis – Final Notes and Vectors
    • The Frida Codeshare
    • Using Frida Codeshare & Startup Scripts
    • Common Issue: Can’t Decode Resources
  • Android Bug Bounty Hunt
    • Bounty Hunt 1 – Joann Fabrics
    • Bounty Hunt 2 – Sam’s Club App
    • Bounty Hunt 2 – Zaxby’s
  • BONUS – Android Red Teaming
    • In-Line Attacks
    • Creating a Generic APK with Metasploit Shell
    • Injecting Play Store App with Metasploit Shell
    • The Ghost Framework
  • iOS Introduction and Architecture
    • Intro to iOS
  • iOS Lab Setup
    • xCode Setup/Install
    • Using xCode
    • Developer License Setup
    • AnyTrans (Pull IPA from App Store)
    • IPATool (Pull IPA from App Store – Updated)
    • Additional Emulator Options iOS (Optional)
  • iOS Static Analysis
    • Manual Static Analysis
    • Automated Analysis with MobSF
  • iOS Dynamic Analysis/Jailbreaking
    • Burp Suite Setup & Usage
    • Proxyman – iOS
    • SSL Pinning iOS
    • Using Objection for iOS
    • Jailbreaking
    • Burp Mobile Assistant (Optional)
    • SSL Killswitch
    • Jailbreaking iOS 15.x-16.x
    • SSL Killswitch iOS 15.x-16.x
    • Traffic Interception iOS 15.x-16.x
  • iOS Bug Bounty Hunt
    • Bug Bounty Hunt 1 – Nike App
    • Bug Bounty Hunt 2 – Kohl’s
  • MAPTv2 – Introduction and Course Resources
    • About This Course
    • About Me
    • Course Discord
    • Course Outline
    • Mobile Penetration Testing Certification Landscape
    • Device Requirements
  • MAPTv2 – Mobile Pentesting Process
    • Mobile Pentesting Process vs Traditional Penetration Test
    • Mobile Pentesting War Stories
    • What jobs are there for Mobile Pentesters?
    • New Lesson
  • Tools Setup
  • CTF With Me
  • Code It With Me
  • iOS Penetration Testing Setup
  • iOS Penetration Testing
  • Wrapping Up
    • Next Steps: The Practical Mobile Pentest Associate (PMPA)

This Course Is Included in Your All-Access Membership

One membership gives you ongoing access to Mobile Application Penetration Testing, every other paid Academy course, and an active community of learners and mentors in Discord.

INSTRUCTORS

Meet Your Instructor

Learn from industry experts with real-world cybersecurity experience.

Instructor Aaron Wilson

Aaron Wilson

Aaron is a passionate security professional with experience in the Fortune 50. He is a Principal Penetration Tester at TCM Security, responsible for Mobile Application Penetration Testing of over 20 Mobile Apps. He is also an avid Capture the Flag Creator and has published multiple rooms on TryHackMe. Aaron is also CEO and Founder of the Wilson Security Group and publishes videos on YouTube on security topics and cybersecurity certification reviews.

Aaron holds certifications such as the eMAPT, CISSP, eCPPTv2, eWAPTv2, CEH, and eJPT certifications among others. He holds a bachelor’s degree in Security and Risk Analysis from Penn State University as well as a Master’s in Information Assurance and Cybersecurity from Western Governor’s University (WGU).

Prepare for the Practical Mobile Pentest Associate (PMPA) Exam

The PMPA certification will assess a student’s ability to perform a mobile application penetration test at an associate level.

Pair the Mobile Application Penetration Testing course with the PMPA exam to validate your skills with a recognized credential.

FAQS

Common Questions

Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

Can I get a refund if I'm unhappy with my purchase?
2
3

Yes. All courses come with a 24-hour money-back guarantee.

Will I receive a certificate of completion when I finish a course?
2
3

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?
2
3

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Membership?
2
3

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

What if you already own courses on TCM Academy?
2
3

If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

I can see the course, but it won’t load or play. What should I do?
2
3

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

This course is included in our All-Access Membership, starting at $29.99/month.

Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

Ready to level up your Cybersecurity Career?

Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

PWPA