舉報

會員
Learning Pentesting for Android Devices
最新章節:
Index
Thisisaneasytofollowguide,fullofhandsonandrealworldexamplesofapplications.Eachofthevulnerabilitiesdiscussedinthebookisaccompaniedwiththepracticalapproachtothevulnerability,andtheunderlyingsecurityissue.ThisbookisintendedforallthosewhoarelookingtogetstartedinAndroidsecurityorAndroidapplicationpenetrationtesting.Youdon’tneedtobeanAndroiddevelopertolearnfromthisbook,butitishighlyrecommendedthatdevelopershavesomeexperienceinordertolearnhowtocreatesecureapplicationsforAndroid.
目錄(79章)
倒序
- coverpage
- Learning Pentesting for Android Devices
- Credits
- Foreword
- About the Author
- Acknowledgments
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Getting Started with Android Security
- Introduction to Android
- Digging deeper into Android
- Sandboxing and the permission model
- Application signing
- Android startup process
- Summary
- Chapter 2. Preparing the Battlefield
- Setting up the development environment
- Useful utilities for Android Pentest
- Summary
- Chapter 3. Reversing and Auditing Android Apps
- Android application teardown
- Reversing an Android application
- Using Apktool to reverse an Android application
- Auditing Android applications
- Content provider leakage
- Insecure file storage
- OWASP top 10 vulnerabilities for mobiles
- Summary
- Chapter 4. Traffic Analysis for Android Devices
- Android traffic interception
- Ways to analyze Android traffic
- HTTPS Proxy interception
- Extracting sensitive files with packet capture
- Summary
- Chapter 5. Android Forensics
- Types of forensics
- Filesystems
- Using dd to extract data
- Using Andriller to extract an application's data
- Using AFLogical to extract contacts calls and text messages
- Dumping application databases manually
- Logging the logcat
- Using backup to extract an application's data
- Summary
- Chapter 6. Playing with SQLite
- Understanding SQLite in depth
- Security vulnerability
- Summary
- Chapter 7. Lesser-known Android Attacks
- Android WebView vulnerability
- Infecting legitimate APKs
- Vulnerabilities in ad libraries
- Cross-Application Scripting in Android
- Summary
- Chapter 8. ARM Exploitation
- Introduction to ARM architecture
- Setting up the environment
- Simple stack-based buffer overflow
- Return-oriented programming
- Android root exploits
- Summary
- Chapter 9. Writing the Pentest Report
- Basics of a penetration testing report
- Writing the pentest report
- Summary
- Security Audit of
- Table of Contents
- 1. Introduction
- 2. Auditing and Methodology
- 3. Conclusions
- Index 更新時間:2021-07-16 12:14:06
推薦閱讀
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 白帽子講Web安全(紀念版)
- 網絡安全意識導論
- INSTANT Windows PowerShell
- 同態密碼學原理及算法
- 計算機網絡安全技術研究
- 網絡安全能力成熟度模型:原理與實踐
- 可信計算3.0工程初步(第二版)
- 信息安全案例教程:技術與應用(第2版)
- 網絡服務安全與監控
- 捍衛隱私
- 精通Metasploit滲透測試(第3版)
- 復雜網絡環境下訪問控制技術
- 基于數據科學的惡意軟件分析
- 無線安全與攻防入門很輕松(實戰超值版)
- 業務安全關鍵技術與應用實踐
- Securing Docker
- Implementing AppFog
- 商用密碼權威指南:技術詳解、產品開發與工程實踐
- Mastering Identity and Access Management with Microsoft Azure
- Hands-On Web Penetration Testing with Metasploit
- 網絡安全工具攻防實戰從新手到高手(微課超值版)
- Mastering Blockchain
- 計算機網絡安全(第2版)
- eBPF云原生安全:原理與實踐
- 數字與安全:數智時代安全先鋒
- 信息安全技術專業基于工作過程支撐平臺課程體系開發實踐
- Mobile Security:How to Secure,Privatize,and Recover Your Devices
- 天地一體化信息網絡信息安全保障技術
- 數據安全與隱私計算