Attack & Defend Android Applications

This training is deprecated. Cyfinoid is keeping this page online as an archive so previous attendees, conference visitors, and people researching the class can still find it, but we do not currently offer new public or private deliveries of this course.

Attack & Defend Android Applications was a hands-on training focused on both attacking and defending the Android application ecosystem. It was designed for people who needed a practical, methodical way to assess Android apps across common attack paths, implementation weaknesses, and defensive controls.

The course combined offensive and defensive perspectives rather than treating Android application security as a narrow reverse-engineering exercise. It covered how Android apps are attacked in practice, how security engineers and pentesters can assess them systematically, and how development teams can strengthen their applications and supporting pipelines.

Training Status

  • Deprecated / archived course
  • No future public sessions are planned
  • Not currently available as a private / corporate workshop
  • This page is retained for reference, discoverability, and past attendee context

Archived Overview

This training covered the Android application ecosystem across both attack and defense. The goal was not to turn beginners into instant experts, but to give participants a repeatable assessment methodology they could apply to real Android applications.

Participants worked through common Android testing and security engineering tasks such as:

  • Traffic interception across HTTP, HTTPS, WebSocket, and related protocols
  • Root detection bypass
  • Static and dynamic analysis
  • Dynamic instrumentation with tools such as Frida and Magisk
  • Assessment of non-Java / Kotlin mobile apps such as React Native and Flutter

The defensive side of the course focused on helping teams improve Android application security through:

  • Application threat modeling
  • Identification of security weaknesses
  • Adding security into CI / CD pipelines
  • Reviewing and prioritizing security findings
  • Improving visibility into third-party components and supply chain risks

Archived Syllabus

Basics

  • Understanding Android OS architecture
  • Android permission model
  • Inter-process communication
  • Intents, binders, and deep linking
  • Application structure

Attack

  • Attack surface mapping
  • MITRE ATT&CK and OWASP MSTG
  • Traffic interception
  • Root detection bypass
  • Deobfuscating application code
  • Dynamic instrumentation
  • Static and dynamic analysis
  • Hybrid app assessment including React Native, Flutter, and .NET-based apps

Defend

  • Threat modeling
  • OWASP MASVS
  • Defense strategies
  • CI / CD pipeline security for applications
  • Static analysis with Semgrep
  • Dynamic analysis
  • Third-party library tracking
  • Supply chain security considerations

Who This Training Was For

  • Application security engineers
  • Penetration testers
  • Mobile security practitioners
  • Engineering teams responsible for Android application security

Student Requirements

  • Basic familiarity with software development and application security concepts
  • Comfort with hands-on testing workflows
  • Prior Android security experience was helpful, but the course was intended to be methodical rather than assumption-heavy

What Students Received

  • Access to the learning portal and cloud lab environments
  • Slide deck for the material covered during the class
  • Detailed answer sheets and supporting material for continued practice

Recent Previous Run

Attack & Defend Android Applications c0c0n 2024

13 November 202414 November 2024
Gandhinagar, Gujrat
WS-Anant-2

Attack & Defend Android Applications BlackHat USA 2024

5 August 20246 August 2024
Virtual
bh-usa-24-android-56

Testimonials

Impressive Content

Great delivery, very attentive, excellent knowledge base provided. The provision of material is a highlight.

Attendee @ BlackHat USA
Insightful and Well-Worth the Investment

The presenters conveyed a significant amount of knowledge and I’m walking away with good value for $. Excellent work and great training!

Attendee @ Blackhat USA
Valuable Insights for Real-World Mobile Pentesting

It was a very complete course providing me with very useful information that I will put in practice as I'm part of Mobile Pentest team in my organization, I'm very satisfied with the content and kudos to both instructors, they are pretty amazing with plenty of verifiable experience

Attendee @ BlackHat USA
Smooth Learning Curve for Newcomers

I'm a beginner level but was easy for me to understand all the topics because it was very clear the examples for each topic. Thanks for the help.

Attendee @ BlackHat USA

Looking For Current Trainings

Cyfinoid no longer offers this Android training. If you are looking for currently active trainings or related private engagements, please visit the current Cyfinoid trainings pages or contact us.

Scroll to Top