舉報

會員
Learning Pentesting for Android Devices
最新章節:
Index
Thisisaneasytofollowguide,fullofhandsonandrealworldexamplesofapplications.Eachofthevulnerabilitiesdiscussedinthebookisaccompaniedwiththepracticalapproachtothevulnerability,andtheunderlyingsecurityissue.ThisbookisintendedforallthosewhoarelookingtogetstartedinAndroidsecurityorAndroidapplicationpenetrationtesting.Youdon’tneedtobeanAndroiddevelopertolearnfromthisbook,butitishighlyrecommendedthatdevelopershavesomeexperienceinordertolearnhowtocreatesecureapplicationsforAndroid.
目錄(79章)
倒序
- coverpage
- Learning Pentesting for Android Devices
- Credits
- Foreword
- About the Author
- Acknowledgments
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Getting Started with Android Security
- Introduction to Android
- Digging deeper into Android
- Sandboxing and the permission model
- Application signing
- Android startup process
- Summary
- Chapter 2. Preparing the Battlefield
- Setting up the development environment
- Useful utilities for Android Pentest
- Summary
- Chapter 3. Reversing and Auditing Android Apps
- Android application teardown
- Reversing an Android application
- Using Apktool to reverse an Android application
- Auditing Android applications
- Content provider leakage
- Insecure file storage
- OWASP top 10 vulnerabilities for mobiles
- Summary
- Chapter 4. Traffic Analysis for Android Devices
- Android traffic interception
- Ways to analyze Android traffic
- HTTPS Proxy interception
- Extracting sensitive files with packet capture
- Summary
- Chapter 5. Android Forensics
- Types of forensics
- Filesystems
- Using dd to extract data
- Using Andriller to extract an application's data
- Using AFLogical to extract contacts calls and text messages
- Dumping application databases manually
- Logging the logcat
- Using backup to extract an application's data
- Summary
- Chapter 6. Playing with SQLite
- Understanding SQLite in depth
- Security vulnerability
- Summary
- Chapter 7. Lesser-known Android Attacks
- Android WebView vulnerability
- Infecting legitimate APKs
- Vulnerabilities in ad libraries
- Cross-Application Scripting in Android
- Summary
- Chapter 8. ARM Exploitation
- Introduction to ARM architecture
- Setting up the environment
- Simple stack-based buffer overflow
- Return-oriented programming
- Android root exploits
- Summary
- Chapter 9. Writing the Pentest Report
- Basics of a penetration testing report
- Writing the pentest report
- Summary
- Security Audit of
- Table of Contents
- 1. Introduction
- 2. Auditing and Methodology
- 3. Conclusions
- Index 更新時間:2021-07-16 12:14:06
推薦閱讀
- 攻守道:企業數字業務安全風險與防范
- Mobile Forensics Cookbook
- 信息系統安全檢測與風險評估
- Wireshark 2 Quick Start Guide
- 可信計算3.0工程初步(第二版)
- API安全技術與實戰
- 信息安全等級保護測評與整改指導手冊
- 解密數據恢復
- 華為防火墻實戰指南
- Mastering Reverse Engineering
- Web安全攻防從入門到精通
- 動態賦能網絡空間防御
- 黑客攻防從入門到精通:實戰篇(第2版)
- 大數據時代的智慧城市與信息安全
- 商用密碼發展報告(2012—2017年)
- 無線安全與攻防入門很輕松(實戰超值版)
- Burp Suite Essentials
- 網絡安全運營服務能力指南(套裝共9冊)
- 可信軟件若干關鍵技術的研究
- 企業網絡安全建設
- Nmap 6:Network exploration and security auditing Cookbook
- Practical Mobile Forensics(Second Edition)
- Building Virtual Pentesting Labs for Advanced Penetration Testing
- 計算機網絡安全原理
- 巧學活用網絡安全與維護
- Kali Linux Intrusion and Exploitation Cookbook
- 互聯網安全建設從0到1
- 物聯網設備安全
- 涉密信息管理系統
- 數據安全與隱私計算