Time
3 hours 58 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:00
All right. So I hope those questions weren't too hard for you. I know you've been working on those case studies, So you've got a lot of information flowing around in your brainy Just pick up the stuff that you want when it comes to mobile. Now, analysis. Right?
00:11
Right. Okay, so question one. Where does the IOS store keys and certificates? So if you remember, this is a question from module one.
00:20
Right? So which one is it? Security
00:24
and clave? That's
00:29
security and Cleave. Yup. That's right
00:33
Telling it now.
00:34
And these don't exist, Right?
00:36
Okay, So which of the items below are risks to mobile devices? Okay, well, we've got here. Insecure passwords, incorrect user permissions,
00:45
unpatched os or all of them. I'm sorry. All nor none of them. Well, if you think about it insecure passwords, that is a threat.
00:55
Incorrect user permissions also a threat.
00:59
Unpatched OS is
01:02
also a threat.
01:03
That would be none of them.
01:06
They're none of these air risks to mobile devices. They're all threats.
01:11
Okay, Next, what is the main I p c r p c. System in an drone? So when we talk about I p c and R B c were talk about messaging, right? The inter process communication the remote procedure calls
01:25
Well, yes, it happens with intense, but no, because that doesn't facilitate it.
01:33
It would be the limits binder that actually facilitates the intense.
01:41
Okay, Next, what component of android allows data to be shared between applications facilitated by the binder?
01:48
So that would be the content provider.
01:51
Remember, the content provider moves data back and forth between applications facilitated by the binder
01:57
SC Olynyk stuff permissions, user permissions and the android run Time does not.
02:05
Okay. Last question. What is the command to retrieve a file from an android phone? 80 b route will know that. What's for her route? Correct.
02:13
ADP says me. Definitely not. That opens doors right now That doesn't open doors.
02:17
80 be analyzed. Doesn't work.
02:21
80 be full pot
02:23
80. Be full.
02:24
Yeah, that's right. A T B. Pull Pyle bath.
02:29
Great.
02:30
Good job

Up Next

Mobile Malware Analysis Fundamentals

In the Mobile Malware Analysis Fundamentals course, participants will obtain the knowledge and skills to perform basic malware analysis on mobile devices. Participants will perform these tasks by learning and implementing tools and techniques while examining malicious programs.

Instructed By

Instructor Profile Image
Brian Rogalski
CEO of Hexcapes
Instructor