Module 15 — Data Storage Security & Local Forensics in Android

Scope & ethics reminder: All analysis, extraction, and tests described here are for authorized assessments and lab environments only. Never perform these actions against production user devices or systems without explicit written permission. This expanded Module 15 goes far beyond the high-level overview: it gives you the full playbook — commands, scripts, forensic workflows, developer-safe … Ler mais

Module 14 — Android Components & IPC Security

Scope & ethics: This module is designed for authorized, lab-only testing and secure design review of Android applications—particularly high-risk apps such as banking. It covers how to systematically assess and harden Android components (Activities, Services, BroadcastReceivers, ContentProviders) and the IPC (Inter-Process Communication) surfaces they expose: Intents, Binder/AIDL, deep links, FileProvider, and PendingIntent. We emphasize defensive … Ler mais

Module 13 — Forensic Validation, Evidence Handling & Vendor Claim Reproduction

Purpose & scope: This module gives you a complete, auditable workflow to (1) validate integrity- or security-bypass claims, (2) collect forensic-grade evidence from Android app tests, and (3) produce reproducible results that hold up under scrutiny. It covers artifacts to demand from third parties, chain-of-custody, time synchronization, redaction/PII hygiene, structured logging, replay-safe lab procedures, and … Ler mais

Module 12 — Device & App Integrity: Play Integrity, Key Attestation, and Root/Emulator Signals

Purpose & scope: This module gives you a complete, defensible workflow to design, test, and audit Android device/app integrity. You’ll learn how Play Integrity, Android Key Attestation, and local integrity signals (root/emulator/debug/instrumentation checks) should be implemented, how to validate them server-side, how to interpret vendor claims (“we bypassed Play Integrity / RootBeer”), and how to … Ler mais

Hacking WordPress

Introduction WordPress Overview WordPress is the world’s most widely used open-source Content Management System (CMS), powering nearly a third of all websites globally. It serves a variety of purposes, from personal blogs and discussion forums to e-commerce platforms, project tracking tools, and document management systems. One of the main reasons for its popularity is its … Ler mais

Module 11 — Authentication, Cryptography & Key Management

Scope & ethics reminder: This module is for authorized, lab-only testing and for building defensible implementations in banking apps. It explains how to design and validate auth and crypto correctly. It does not provide offensive instructions for breaking real systems. This module ties together identity, sessions, device security, and cryptography on Android: how to design … Ler mais

Module 10 — Network & API Security

Safety & scope reminder: everything in this module is intended for authorized, lab-only testing against apps you own or have explicit written permission to test. The guidance is designed to help ethical testers and defenders harden mobile apps and their backends (particularly banking apps). Never perform interception, manipulation, or unauthorized scanning against systems outside your … Ler mais

Module 9 — Native Code & Advanced Reverse Engineering

Scope & ethics reminder: everything here is intended for authorized, lab-only testing (intentionally vulnerable APKs, test builds, or apps where you have written permission). Native reverse engineering and manipulation are powerful techniques — do not apply them to production systems or devices you do not own/are not permitted to test. Where a technique could enable … Ler mais

Module 8 — Application Patching, Repackaging, and Tamper Testing

Ethical Reminder:The techniques in this module are powerful and must only be used in authorized labs with intentionally vulnerable APKs or apps for which you have explicit written permission. Patching, bypassing controls, and redistributing APKs without consent is illegal. Here, we focus on understanding risks, testing robustness, and helping developers improve defenses. 8.0 Learning Objectives … Ler mais

Module 7 — Advanced Dynamic Analysis with Objection

Important Reminder: Everything in this module must be practiced only in authorized labs, with vulnerable APKs or applications you have written permission to test. The tools and techniques here are powerful and can alter app behavior at runtime. They should never be used on production systems or customer data. 7.0 Learning Objectives By the end … Ler mais

Introduction to Bash Scripting

Bourne Again Shell (Bash) Bash is the shell and scripting language we use to interact with Unix-like systems and issue commands to the operating system. Since May 2019, Windows ships the Windows Subsystem for Linux (WSL), which lets you run Bash on Windows. Learning Bash is essential for working quickly and effectively—unlike compiled programming languages, … Ler mais

Module 6 — Runtime Instrumentation & Hooking

Safety & scope reminder: everything in this module is written for authorized, lab-only testing (intentionally vulnerable APKs or apps you have written permission to test). I will show practical Frida examples for instrumentation and analysis in a controlled environment. I won’t provide operational instructions intended to bypass protections on real production apps or to exploit … Ler mais