Table of Contents
- Setting up the lab
- Android Rooting
- Fundamental Building Blocks of Android Apps
- Overview of Attacking Android Apps
- Data storage and it's security
- Server Side Attacks
- Client side attacks – Static Analysis techniques
- Client side attacks – Dynamic Analysis Techniques
- Android Malwares and Reverse Engineering
- Attacks on Android Devices

