目錄(91章)
倒序
- 封面
- 版權頁
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Setting Up the Lab
- Installing the required tools
- Android Studio
- Setting up an AVD
- Configuring the AVD
- ADB Primer
- Summary
- Chapter 2. Android Rooting
- What is rooting?
- Locked and unlocked boot loaders
- Stock recovery and Custom recovery
- Rooting Process and Custom ROM installation
- Rooting a Samsung Note 2
- Flashing the Custom ROM to the phone
- Summary
- Chapter 3. Fundamental Building Blocks of Android Apps
- Basics of Android apps
- Android app components
- Building DEX files from the command line
- What happens when an app is run?
- Understanding app sandboxing
- Summary
- Chapter 4. Overview of Attacking Android Apps
- Introduction to Android apps
- Understanding the app's attack surface
- Threats at the client side
- Threats at the backend
- Guidelines for testing and securing mobile apps
- Automated tools
- Identifying the attack surface
- QARK (Quick Android Review Kit)
- Summary
- Chapter 5. Data Storage and Its Security
- What is data storage?
- Shared preferences
- SQLite databases
- Internal storage
- External storage
- User dictionary cache
- Insecure data storage – NoSQL database
- Backup techniques
- Being safe
- Summary
- Chapter 6. Server-Side Attacks
- Different types of mobile apps and their threat model
- Mobile applications server-side attack surface
- Strategies for testing mobile backend
- Summary
- Chapter 7. Client-Side Attacks – Static Analysis Techniques
- Attacking application components
- Static analysis using QARK:
- Summary
- Chapter 8. Client-Side Attacks – Dynamic Analysis Techniques
- Automated Android app assessments using Drozer
- Introduction to Cydia Substrate
- Runtime monitoring and analysis using Introspy
- Hooking using Xposed framework
- Dynamic instrumentation using Frida
- Logging based vulnerabilities
- WebView attacks
- Summary
- Chapter 9. Android Malware
- What do Android malwares do?
- Writing Android malwares
- Registering permissions
- Malware analysis
- Tools for automated analysis
- Summary
- Chapter 10. Attacks on Android Devices
- MitM attacks
- Dangers with apps that provide network level access
- Using existing exploits
- Malware
- Bypassing screen locks
- Pulling data from the sdcard
- Summary
- Index 更新時間:2021-07-14 10:56:34
推薦閱讀
- Python數據可視化:基于Bokeh的可視化繪圖
- Windows系統管理與服務配置
- Java開發入行真功夫
- 名師講壇:Java微服務架構實戰(SpringBoot+SpringCloud+Docker+RabbitMQ)
- HTML5+CSS3+JavaScript Web開發案例教程(在線實訓版)
- 前端HTML+CSS修煉之道(視頻同步+直播)
- 焊接機器人系統操作、編程與維護
- 51單片機C語言開發教程
- Python深度學習原理、算法與案例
- Scala for Machine Learning(Second Edition)
- C專家編程
- Java語言程序設計教程
- Qt5 C++ GUI Programming Cookbook
- 寫給程序員的Python教程
- 零基礎學Python編程(少兒趣味版)
- Web App Testing Using Knockout.JS
- Learning iOS Security
- Unity Android Game Development by Example Beginner's Guide
- H5+移動營銷設計寶典
- Android初級應用開發
- PHP典型模塊與項目實戰大全
- 開發者測試
- Responsive Web Design with HTML5 and CSS3(Second Edition)
- Spring 5.0 Cookbook
- 深入理解OSGi:Equinox原理、應用與最佳實踐
- Python數據結構與算法分析(第2版)
- Harbor權威指南:容器鏡像、Helm Chart等云原生制品的管理與實踐
- Oracle數據庫基礎與應用教程
- 孩子趣味學編程之Scratch篇
- PostgreSQL Server Programming(Second Edition)