top of page

Mobile Hacking

The OWASP Mobile Application Security Verification Standard (MASVS) is the industry standard for mobile application security. It provides a comprehensive set of security controls that can be used to assess the security of mobile apps across various platforms (e.g., Android, iOS) and deployment scenarios (e.g., consumer, enterprise). The standard covers the key components of the mobile app attack surface, including storage, cryptography, authentication and authorization, network communication, interaction with the mobile platform, code quality and resilience against reverse engineering and tampering.

Partners1.jpg

Pricing
$60,000 mxn in 4 payments (one every week) or
$40,000 mxn one-time payment
(Bank transfer for Paypal)

Hours: 24hrs (3hrs Saturdays/3hrs Sundays x 4 weeks)
 

Full Course

Module 1 - Setting up the Basics

VirtualLabsLogo1.png

Basic tool set up. To run an environment where we can work on our Mobile Hacking course, we must install some basic tools to perform the hack.

MobileSetupLogo1.jpg

Installing VM (Virtual Machine)

We must install a Virtual Machine on Windows or MAC to run our hacking tools in a safe environment.

Installing Offensive Security Linux

At this stage, we will install the tool that will help us with our hacks later. We have many options, but we will refer this time to Kali Linux, Parrot Security, and UTM.

AndroidStudioLogo1.png

Installing Android Studio

If we don't have an Android phone, we can use Android Studio to emulate it and for other technical purposes.

JDKLogo1.jpg

Installing JDK Tools

If you have payload issues, the JDK Tool will help us with that, as it will enable the needed libraries to run them.

SwiftLogo1_edited.jpg

Installing Swift for MAC/Windows

Apple created Swift, a programming language that built apps for Apple devices. It's a high-level, general-purpose language designed to be easy to learn.

XcodeLogo1.png

Installing Xcode for MAC

Xcode is Apple's integrated development environment for macOS, which is used to develop software for macOS, iOS, iPadOS, watchOS, tvOS, and visionOS.

GenyMotionLogo1.webp

Installing Genymotion

Genymotion is an efficient Android emulator for testing Android applications. Learn about main concepts, from configuration to deploying a test application to the Emulator.

FirebaseLogo1.png

Installing Firebase

Firebase provides detailed documentation and cross-platform app development SDKs, to help you build and ship apps for iOS, Android, the Web, Flutter, Unity, and C++.

LinuxLogo1.png

Linux Fundamentals

Before hacking, we have to learn the basics of commands.

Module 2 - Crafting payloads

MaliciousPayloadLogo1.png

In this module, we will understand the basic concepts of a malicious payload and how to create it and distribute it.

MetasploitLogo1.jpg

Metasploit (meterpreter & postgresql)

Metasploit is a tool for exploitation. We will use "Msfvenom" to create our payloads.

TunnelingLogo1.jpg

Tunneling (ngrok & apache)

Tunneling allows secure data transmission between networks. It's often used in virtual private networks (VPNs). We will use it as part of our backdoor.

DeveloperKeyLogo1.png

Developer Key

If we want our payload to work successfully on a device, we must sign our application first. So it can be downloaded and distributed by users.

Module 3 - Android Studio

AndroidStudioLogo1.png

We will learn to use Android Studio, which can emulate an actual Android device

AndroidStudioLogo1.png

SDK Installation

SDK stands for Software Development Kit. It's a collection of tools that helps developers create applications for a specific platform.

AndroidStudioLogo1.png

Creating a Project/Running Emulator

We will learn the basics of the interface, create projects and run the emulators we create

Module 4 - iOS Development

In this course, we will learn the usage of Swift and Xcode. Languages that can help us in the future to hack and to understand better how internally works an iOS.

SwiftLogo1_edited.jpg

Swift fundamentals

We will learn about the environment and how to use some functions.

XcodeLogo1.png

Xcode fundamentals

We will learn about the environment and how to use some functions.

Module 5 - Rooting & Jailbreacking

Designer.jpeg

iOS jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by Apple on devices running iOS and iOS-based operating systems. It is typically done through a series of kernel patches.

JailbreakLogo2.jpeg

Jailbreaking iOS

We will learn the process of jailbreaking an iOS device.

AndroidJailbreakLogo1.jpeg

Rooting Android

We will learn the process of rooting an Android device.

Module 6 - Reverse Engineering

Designer.jpeg

The process of taking a piece of software or hardware and analyzing its functions and information flow to understand its functionality and behavior. Malware is commonly reverse-engineered in cyber defense.

ReverseEngineeringLogo1.jpeg

Reverse Engineering tools (for Linux, MAC, Windows)

We will learn the basics of operating some of the most used reverse engineering tools.

Module 7 - Practice Labs

Designer.jpeg

We will put everything into practice.

We have CTFs in different situations to make them as authentic as possible.

ReverseEngineeringLogo1.jpeg

CTFs

Virtual Machines (mobile emulators) and real mobile hacking at your disposal!

Legal Disclaimer

Designer.jpeg

Disclaimer

All the techniques provided in the tutorials on www.lyonnfiurex.com are solely for educational purposes. All techniques taught here are only meant to be used in a closed laboratory environment or with consent from a second or third party. If you are using any of those techniques for illegal purposes, Lyon & Fiurex LLC Group can’t be held responsible for possible lawful consequences.

Any actions or activities related to the material within www.lyonnfiurex.com are solely your responsibility. If you misuse this information for illegal activities, criminal charges may be brought against your person.

The content on www.lyonnfiurex.com can be potentially damaging and or dangerous if misused. DO NOT, NEVER try any of the techniques you learned on www.lyonnfiurex.com without consent of the second/third party.

Lyon & Fiurex LLC Group is not accountable for the use of the information provided in our courses, which are solely for educational purposes.

bottom of page