2. The Stolen Device Threat and Mobile Malware.zip
1 GB
1 - The Stolen Device Threat
2 - Jailbreaking iOS
3 - Rooting Android
4 - Data Storage on Android
5 - Data Storage on iOS
6 - Mitigating Malware
2 - Jailbreaking iOS
3 - Rooting Android
4 - Data Storage on Android
5 - Data Storage on iOS
6 - Mitigating Malware
3. Static Application Analysis.zip
996.3 MB
1 - Static Application Analysis
2 - Manual Static Analysis
3 - Automating App Analysis
4 - Obfuscated Apps
5 - Third Party App Platforms
2 - Manual Static Analysis
3 - Automating App Analysis
4 - Obfuscated Apps
5 - Third Party App Platforms
4. Dynamic Mobile Application Analysis and Manipulation.zip
722.3 MB
1 - Dynamic Mobile Application Analysis and Manipulation
2 - Android Dynamic Anaysis with Drozer
3 - iOS Dynamic Analysis with Needle
4 - Modifying Mobile Applications
5 - Mobile Application Runtime Manipulation
6 - Automated Runtime Manipulation with Objection
7 - Application Security Verification
2 - Android Dynamic Anaysis with Drozer
3 - iOS Dynamic Analysis with Needle
4 - Modifying Mobile Applications
5 - Mobile Application Runtime Manipulation
6 - Automated Runtime Manipulation with Objection
7 - Application Security Verification
5. Mobile Penetration Testing.zip
900.1 MB
1 - Mobile Penetration Testing
2 - Network Activity Analysis
3 - Network Manipulation Attacks
4 - Network Traffic Manipulation
5 - SSL/TLS attacks
6 - Intercepting SSL/TLS traffic
7 - Leveraging Mobile Malware
8 - Where to go from here
2 - Network Activity Analysis
3 - Network Manipulation Attacks
4 - Network Traffic Manipulation
5 - SSL/TLS attacks
6 - Intercepting SSL/TLS traffic
7 - Leveraging Mobile Malware
8 - Where to go from here
1. Foundation of OSINT.zip
514.6 MB
1 - Course Introduction
2 - Understanding OSINT
3 - Goals of OSINT Collection
4 - Diving into the Collecting
5 - Taking Excellent Notes
6 - Determining Your Threat Profile
7 - Setting up an OSINT Platform
8 - Effective Habits and Process
9 - Leveraging Search Engines
2 - Understanding OSINT
3 - Goals of OSINT Collection
4 - Diving into the Collecting
5 - Taking Excellent Notes
6 - Determining Your Threat Profile
7 - Setting up an OSINT Platform
8 - Effective Habits and Process
9 - Leveraging Search Engines
2. Gathering Searching and Analyzing OSINT.zip
684.6 MB
1 - Data Analysis Challenges
2 - Harvesting Web Data
3 - File Metadata Analysis
4 - OSINT Frameworks
5 - Basic Data Addresses and Phone Numbers
6 - Basic Data Email Addresses
7 - User Names
8 - Avatars and Reverse Image Searches
9 - Additional Public Data
10 - Creating Sock Puppets
2 - Harvesting Web Data
3 - File Metadata Analysis
4 - OSINT Frameworks
5 - Basic Data Addresses and Phone Numbers
6 - Basic Data Email Addresses
7 - User Names
8 - Avatars and Reverse Image Searches
9 - Additional Public Data
10 - Creating Sock Puppets
3. Social Media Geolocation and Imagery.zip
673.4 MB
1 - People Search Engines
2 - Facebook Analysis
3 - Linkedin Data
4 - Instagram
5 - Twitter Data
6 - Geolocation
7 - Imagery and Maps
2 - Facebook Analysis
3 - Linkedin Data
4 - Instagram
5 - Twitter Data
6 - Geolocation
7 - Imagery and Maps
4. Networks Government Business.zip
626.6 MB
1 - Whois
2 - IP Address
3 - DNS
4 - Findings Online Devices
5 - Wireless Networks
6 - Recon Tool Suites and Frameworks
7 - Government Data
8 - Researching Companies
2 - IP Address
3 - DNS
4 - Findings Online Devices
5 - Wireless Networks
6 - Recon Tool Suites and Frameworks
7 - Government Data
8 - Researching Companies