Self-paced Course

Offensive Mobile Reversing and Exploitation (On-demand)

This course offers an in-depth exploration of the internal architectures of Android and iOS operating systems. You'll get an insight into the various platform-specific features, inter-process communication mechanisms, and other unique exploit mitigations. By reviewing the XNU kernel for iOS, and the Android Open Source Project (AOSP) codebase for Android, you'll develop reverse-engineering skills to analyze proprietary security aspects of both systems. The curriculum includes detailed walkthroughs of the jailbreaking and rooting processes, supplemented by case studies of real-world exploits on both platform.

This course is not an Appsec course, as it covers topics related to VR that is suitable for folks interested in learning more about the Android and iOS operating system internals, exploitation techniques etc. This course is a combination of Offensive iOS Internals and Offensive Android Internals.

If you are interested in an Appsec course, check out the Practical Mobile Application Exploitation course.
  • Level

    Intermediate / Advanced

  • Video

    29 hours - 184 videos

  • CERTIFICATION EXAM

    Included

A path to
OMSE certification

Key Objectives

  • Get an understanding of the latest ARM64 instruction set
  • Learn the internals of Mobile Kernels along with several Kernel security mitigations
  • Understand some of the latest exploit mitigations (PAC, CoreTrust, PPL, SPTM/TXM, RKP, MTE, SELinux,  etc)
  • Get an intro to common bug categories like UaF, Heap overflow, PUaF etc
  • Learn about Exploit Primitives and the different steps performed to build Stronger primitives
  • Understanding how Rooting and Jailbreaks work
  • Learn about the platform IPC mechanism like Mach Messaging and Binder
  • Reverse engineer iOS and Android binaries (Apps and system binaries)
  • Understand the different Post Exploitation techniques in an Exploit chain
  • Learn how Mobile malwares work, and how to reverse engineer them
  • Understand in depth how Code Signing and Sandboxing works in iOS and Android
  • Understand how to Reverse Engineer Malwares on Mobile Devices
  • Learn how to debug userland and system binaries
  • Learn about filesystem of an iOS and Android device
  • Learn how to customize and build Mobile OS and Kernel for Vulnerability Research
  • Learn how to symbolicate the iOS and Android kernel
  • Learn using Case Study of Public Exploits
  • Learn how to extract and decrypt boot images, kernel etc for iOS & Android devices
  • Become a Offensive Mobile Security Expert (OMSE)

Who Should Attend?

This course is for penetration testers, mobile developers or anyone keen to learn mobile OS Internals, and wants to get started in Mobile OS exploitation, or research. 

Prerequisites

To successfully participate in this course, attendees should possess the following:
  • Basic working knowledge of iOS and Android platforms
  • Basic Linux skills and command-line proficiency
  • Understanding of fundamental programming concepts and looping structures in at least one higher-level language (Java, Kotlin, Objective-C, Swift, C, C++, or similar)
  • Basic ARM/AARCH64 binary assembly and exploitation knowledge is recommended, but not required

Duration

  • 365 days of access after purchase

Technical Requirements

  • Laptop with 8+ GB RAM and 40 GB hard disk space
  • Administrative access on the system
  • A physical jailbroken iOS device running iOS 16.x or later, or access to a virtualized environment such as Corellium, is required to complete the labs.
  • To complete the labs, a physical Android device with root access running Android 12.x or later, or access to a virtualized environment like Corellium or an emulator, is required.

Need To Justify To Your Manager?

Need a Template to Justify the Training Request to your Manager? Download the Template below.

Syllabus

Included

Offensive Mobile Security Expert (OMSE)

This course prepares you for the Offensive Mobile Security Expert (OMSE) certification exam, a hands-on assessment specifically designed to test your grasp of advanced mobile security domains including userland and kernel components.
Exam Duration : 48 hours

START LEARNING

Offensive Mobile Reversing and Exploitation Course

Early Bird Offer
  • Lecture recordings and self-assessments
  • Certification of course completion
  • Offensive Mobile Security Expert Exam Attempt
  • Post-training support
Enroll now and enjoy:
  • Early bird price (limited)
  • 365 days of access + 90 days early registration bonus access

Enroll a group

Get in touch for pricing
Includes everything from the individual rate, plus:
  • Special group pricing
  • Oversee and track the progress of group members

Enterprise

Get in touch for pricing
Includes everything from the group rate, with the ability to manage multiple seats and track student progress across all courses. Contact us with your preferred courses and number of students for a customized quote.

Offensive Mobile Reversing and Exploitation course

On-demand
  • Immediate access to materials
  • Lecture recordings and self-assessments
  • 365 days of access
  • Certification of course completion
  • Offensive Mobile Security Expert Exam Attempt
  • Post-training support

Enroll a group

Get in touch for pricing
Includes everything from the individual rate, plus:
  • Special group pricing
  • Oversee and track the progress of group members

Enterprise

Get in touch for pricing
Includes everything from the group rate, with the ability to manage multiple seats and track student progress across all courses. Contact us with your preferred courses and number of students for a customized quote.

Created by

8kSec Academy

Our instructors are experts with over a decade of hands-on experience in mobile security, IoT exploitation, and vulnerability assessment. They've delivered numerous private trainings to high-profile clients and shared their knowledge at renowned conferences like BlackHat, Def Con, POC, TyphoonCon, Brucon, Hack in Paris, Phdays, Appsec USA, and more.

With thousands of students having completed our courses, our instructors continually refine their content based on real-world feedback. Whether through live sessions or our new on-demand courses, we ensure the same high-quality learning experience is accessible to professionals worldwide.