目錄(91章)
倒序
- 封面
- 版權(quán)頁
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Setting Up the Lab
- Installing the required tools
- Android Studio
- Setting up an AVD
- Configuring the AVD
- ADB Primer
- Summary
- Chapter 2. Android Rooting
- What is rooting?
- Locked and unlocked boot loaders
- Stock recovery and Custom recovery
- Rooting Process and Custom ROM installation
- Rooting a Samsung Note 2
- Flashing the Custom ROM to the phone
- Summary
- Chapter 3. Fundamental Building Blocks of Android Apps
- Basics of Android apps
- Android app components
- Building DEX files from the command line
- What happens when an app is run?
- Understanding app sandboxing
- Summary
- Chapter 4. Overview of Attacking Android Apps
- Introduction to Android apps
- Understanding the app's attack surface
- Threats at the client side
- Threats at the backend
- Guidelines for testing and securing mobile apps
- Automated tools
- Identifying the attack surface
- QARK (Quick Android Review Kit)
- Summary
- Chapter 5. Data Storage and Its Security
- What is data storage?
- Shared preferences
- SQLite databases
- Internal storage
- External storage
- User dictionary cache
- Insecure data storage – NoSQL database
- Backup techniques
- Being safe
- Summary
- Chapter 6. Server-Side Attacks
- Different types of mobile apps and their threat model
- Mobile applications server-side attack surface
- Strategies for testing mobile backend
- Summary
- Chapter 7. Client-Side Attacks – Static Analysis Techniques
- Attacking application components
- Static analysis using QARK:
- Summary
- Chapter 8. Client-Side Attacks – Dynamic Analysis Techniques
- Automated Android app assessments using Drozer
- Introduction to Cydia Substrate
- Runtime monitoring and analysis using Introspy
- Hooking using Xposed framework
- Dynamic instrumentation using Frida
- Logging based vulnerabilities
- WebView attacks
- Summary
- Chapter 9. Android Malware
- What do Android malwares do?
- Writing Android malwares
- Registering permissions
- Malware analysis
- Tools for automated analysis
- Summary
- Chapter 10. Attacks on Android Devices
- MitM attacks
- Dangers with apps that provide network level access
- Using existing exploits
- Malware
- Bypassing screen locks
- Pulling data from the sdcard
- Summary
- Index 更新時間:2021-07-14 10:56:34
推薦閱讀
- Embedded Linux Projects Using Yocto Project Cookbook
- Mastering AWS Lambda
- 自己動手實現(xiàn)Lua:虛擬機(jī)、編譯器和標(biāo)準(zhǔn)庫
- Java EE框架整合開發(fā)入門到實戰(zhàn):Spring+Spring MVC+MyBatis(微課版)
- Git高手之路
- Hands-On RESTful Web Services with Go
- Visual C++應(yīng)用開發(fā)
- Hands-On Functional Programming with TypeScript
- Mastering C++ Multithreading
- Python Interviews
- Go語言底層原理剖析
- ASP.NET Web API Security Essentials
- After Effects CC案例設(shè)計與經(jīng)典插件(視頻教學(xué)版)
- 從零開始學(xué)Python大數(shù)據(jù)與量化交易
- HTML并不簡單:Web前端開發(fā)精進(jìn)秘籍
- Building Microservices with Go
- VC++ 2008專題應(yīng)用程序開發(fā)實例精講
- Effective Python:編寫高質(zhì)量Python代碼的90個有效方法(原書第2版)
- Switching to Angular 2
- Android for the BeagleBone Black
- Mastering PostCSS for Web Design
- Vue.js 3移動應(yīng)用開發(fā)實戰(zhàn)
- Swift項目開發(fā)基礎(chǔ)教程
- Java程序員職場全攻略
- CAE分析大系:ABAQUS有限元分析從入門到精通
- 實用XML應(yīng)用開發(fā)技術(shù)
- H5設(shè)計與運(yùn)營(視頻指導(dǎo)版)
- 碼農(nóng)修行:編寫優(yōu)雅代碼的32條法則
- JavaScript Domain:Driven Design
- C#從入門到精通