舉報

會員
Mobile Device Exploitation Cookbook
最新章節:
NFC-based attacks
Thisbookisintendedformobilesecurityenthusiastsandpenetrationtesterswhowishtosecuremobiledevicestopreventattacksanddiscovervulnerabilitiestoprotectdevices.
目錄(71章)
倒序
- 封面
- 版權頁
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Sections
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Introduction to Mobile Security
- Introduction
- Installing and configuring Android SDK and ADB
- Creating a simple Android app and running it in an emulator
- Analyzing the Android permission model using ADB
- Bypassing Android lock screen protection
- Setting up the iOS development environment - Xcode and iOS simulator
- Creating a simple iOS app and running it in the simulator
- Setting up the Android pentesting environment
- Setting up the iOS pentesting environment
- Introduction to rooting and jailbreaking
- Chapter 2. Mobile Malware-Based Attacks
- Introduction
- Analyzing an Android malware sample
- Using Androguard for malware analysis
- Writing custom malware for Android from scratch
- Permission model bypassing in Android
- Reverse engineering iOS applications
- Analyzing malware in the iOS environment
- Chapter 3. Auditing Mobile Applications
- Introduction
- Auditing Android apps using static analysis
- Auditing Android apps a using a dynamic analyzer
- Using Drozer to find vulnerabilities in Android applications
- Auditing iOS application using static analysis
- Auditing iOS application using a dynamic analyzer
- Examining iOS App Data storage and Keychain security vulnerabilities
- Finding vulnerabilities in WAP-based mobile apps
- Finding client-side injection
- Insecure encryption in mobile apps
- Discovering data leakage sources
- Other application-based attacks in mobile devices
- Launching intent injection in Android
- Chapter 4. Attacking Mobile Application Traffic
- Introduction
- Setting up the wireless pentesting lab for mobile devices
- Configuring traffic interception with Android
- Intercepting traffic using Burp Suite and Wireshark
- Using MITM proxy to modify and attack
- Analyzing traffic and extracting sensitive information from iOS App traffic
- Configuring traffic interception with iOS
- WebKit attacks on mobile applications
- Performing SSL traffic interception by certificate manipulation
- Using a mobile configuration profile to set up a VPN and intercept traffic in iOS devices
- Bypassing SSL certificate validation in Android and iOS
- Chapter 5. Working with Other Platforms
- Introduction
- Setting up the Blackberry development environment and simulator
- Setting up the Blackberry pentesting environment
- Setting up the Windows phone development environment and simulator
- Setting up the Windows phone pentesting environment
- Configuring traffic interception settings for Blackberry phones
- Stealing data from Windows phones applications
- Stealing data from Blackberry applications
- Reading local data in Windows phone
- NFC-based attacks 更新時間:2021-07-14 11:18:15
推薦閱讀
- 流量的秘密:Google Analytics網站分析與優化技巧(第2版)
- C語言程序設計教程
- Animate CC二維動畫設計與制作(微課版)
- Blender 3D Incredible Machines
- 高級C/C++編譯技術(典藏版)
- 軟件項目管理實用教程
- Learning Docker Networking
- 深入淺出Go語言編程
- 動手打造深度學習框架
- The Statistics and Calculus with Python Workshop
- 征服C指針(第2版)
- Spark for Data Science
- HTML+CSS+JavaScript前端開發(慕課版)
- Unity3D游戲開發標準教程
- Cocos2D權威指南
- 數據結構和算法(Python和C++語言描述)
- Cacti實戰
- 自動化測試實戰寶典:Robot Framework+Python從小工到專家
- 數字化中臺
- Hands-On Linux Administration on Azure
- 演進式架構
- 用Go語言自制解釋器
- OpenCV計算機視覺編程攻略(第3版)
- Redmine Plugin Extension and Development
- SQL Server 2017 Integration Services Cookbook
- C#從入門到精通
- MATLAB小波分析超級學習手冊
- 量化金融R語言初級教程
- Java從入門到精通(第4版)
- 計算機輔助設計與繪圖(AutoCAD 2015)(第三版)