目錄(91章)
倒序
- 封面
- 版權頁
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Setting Up the Lab
- Installing the required tools
- Android Studio
- Setting up an AVD
- Configuring the AVD
- ADB Primer
- Summary
- Chapter 2. Android Rooting
- What is rooting?
- Locked and unlocked boot loaders
- Stock recovery and Custom recovery
- Rooting Process and Custom ROM installation
- Rooting a Samsung Note 2
- Flashing the Custom ROM to the phone
- Summary
- Chapter 3. Fundamental Building Blocks of Android Apps
- Basics of Android apps
- Android app components
- Building DEX files from the command line
- What happens when an app is run?
- Understanding app sandboxing
- Summary
- Chapter 4. Overview of Attacking Android Apps
- Introduction to Android apps
- Understanding the app's attack surface
- Threats at the client side
- Threats at the backend
- Guidelines for testing and securing mobile apps
- Automated tools
- Identifying the attack surface
- QARK (Quick Android Review Kit)
- Summary
- Chapter 5. Data Storage and Its Security
- What is data storage?
- Shared preferences
- SQLite databases
- Internal storage
- External storage
- User dictionary cache
- Insecure data storage – NoSQL database
- Backup techniques
- Being safe
- Summary
- Chapter 6. Server-Side Attacks
- Different types of mobile apps and their threat model
- Mobile applications server-side attack surface
- Strategies for testing mobile backend
- Summary
- Chapter 7. Client-Side Attacks – Static Analysis Techniques
- Attacking application components
- Static analysis using QARK:
- Summary
- Chapter 8. Client-Side Attacks – Dynamic Analysis Techniques
- Automated Android app assessments using Drozer
- Introduction to Cydia Substrate
- Runtime monitoring and analysis using Introspy
- Hooking using Xposed framework
- Dynamic instrumentation using Frida
- Logging based vulnerabilities
- WebView attacks
- Summary
- Chapter 9. Android Malware
- What do Android malwares do?
- Writing Android malwares
- Registering permissions
- Malware analysis
- Tools for automated analysis
- Summary
- Chapter 10. Attacks on Android Devices
- MitM attacks
- Dangers with apps that provide network level access
- Using existing exploits
- Malware
- Bypassing screen locks
- Pulling data from the sdcard
- Summary
- Index 更新時間:2021-07-14 10:56:34
推薦閱讀
- Linux C/C++服務器開發實踐
- Maven Build Customization
- Java面向對象思想與程序設計
- MongoDB for Java Developers
- 64位匯編語言的編程藝術
- Learning Laravel 4 Application Development
- Mastering Swift 2
- Full-Stack React Projects
- Web Development with MongoDB and Node(Third Edition)
- Python極簡講義:一本書入門數據分析與機器學習
- Java Web開發就該這樣學
- Python機器學習之金融風險管理
- Java EE企業級應用開發教程(Spring+Spring MVC+MyBatis)
- C# Multithreaded and Parallel Programming
- Natural Language Processing with Python Quick Start Guide
- Flutter之旅
- R語言數據分析從入門到實戰
- Swift從入門到精通 (移動開發叢書)
- Python 3.8編程快速入門
- OpenCV:Computer Vision Projects with Python
- SEO的藝術(原書第2版)
- Machine Learning with TensorFlow 1.x
- 深入理解Java虛擬機:JVM高級特性與最佳實踐(第3版)
- Android系統應用開發實戰詳解
- 企業微信開發詳解
- 新印象:中文版Sketch圖標與UI界面設計實例教程
- Neural Networks with Keras Cookbook
- Mastering The Faster Web with PHP,MySQL,and JavaScript
- 高級前端程序員面試筆試寶典
- Storm實時數據處理