Android Bug Bounty Hunting: Hunt like a rat

From setting up a lab to setting you up for attacking a real target

In this course you will first of all learn how to set up your own android mobile penetration testing lab and after that you will be taught a solid methdology you can build upon and expand to grow into the amazing hacker you deserve to be.

We will:

- Set up our own mobile lab

- learn about path variables

- Create a solid methodology to expand upon

- Go deeper into the intricaties of bug bounties

- Create a way of thinking to help you design your own methodology

- Describe what parameter we test for what vulnerability and why


Starting out in bug bounties is hard and most of us start out hacking web applications because they require the least amount of setup. This is a great strategy but at a certain point you are going to want more. Mobile bug bounties is a great path to explore while doing bug bounties because there a lot of programs available that offer mobile applications among their target lists. When we look at other branches of bug bounties such as IP ranges for example we can notice that these are not very prevelant, that is why it is in my opinion the best option to elevate your skill level to a mobile platform with this amazing course. Invest in yourself and become the amazing hacker i  know you can be.


Your Instructor


Experts with David Bombal
Experts with David Bombal

David Bombal, together with some of the best minds in the industry is offering courses on a wide range of topics including networking, programming and software development. Our team has decades of experience teaching students from all over the world.

Together we can do more!

David Bombal (CCIE #11023 Emeritus) passed his Cisco Certified Internetwork Expert Routing and Switching exam in January 2003 and is one of a small percentage of Cisco Engineers that pass their CCIE labs on their first attempt.

David qualified as a Cisco Certified Systems Instructor (CCSI #22787) many years ago! He has been training Cisco courses for over 15 years and has delivered instructor led courses in various countries around the world covering a wide range of Cisco topics from CCNA to CCIE.

He has also personally developed Cisco engineer utilities such as the VPN Config Generator, software, training materials, EBooks, videos and other products which are used throughout the world.

David has designed, implemented and managed networks ranging from single sites to those that span 50 countries.


Wesley Thijs
Wesley Thijs

I am the XSS Rat, an experienced ethical hacker who stands for quality and who believes knowledge is a building block we can all use to grow bigger than we ever were.

As a software test i have a unique skill set that centers around logic flaws and IDORs which i have not seen very much by other hunters.

This gives me the advantage of finding less duplicates and maximizing my chance of finding a vulnerability by picking the correct target and applying the correct test strategy.


Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 14 days and we will give you a full refund.

Get started now!