舉報

會員
Learning Pentesting for Android Devices
最新章節:
Index
Thisisaneasytofollowguide,fullofhandsonandrealworldexamplesofapplications.Eachofthevulnerabilitiesdiscussedinthebookisaccompaniedwiththepracticalapproachtothevulnerability,andtheunderlyingsecurityissue.ThisbookisintendedforallthosewhoarelookingtogetstartedinAndroidsecurityorAndroidapplicationpenetrationtesting.Youdon’tneedtobeanAndroiddevelopertolearnfromthisbook,butitishighlyrecommendedthatdevelopershavesomeexperienceinordertolearnhowtocreatesecureapplicationsforAndroid.
目錄(79章)
倒序
- coverpage
- Learning Pentesting for Android Devices
- Credits
- Foreword
- About the Author
- Acknowledgments
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Getting Started with Android Security
- Introduction to Android
- Digging deeper into Android
- Sandboxing and the permission model
- Application signing
- Android startup process
- Summary
- Chapter 2. Preparing the Battlefield
- Setting up the development environment
- Useful utilities for Android Pentest
- Summary
- Chapter 3. Reversing and Auditing Android Apps
- Android application teardown
- Reversing an Android application
- Using Apktool to reverse an Android application
- Auditing Android applications
- Content provider leakage
- Insecure file storage
- OWASP top 10 vulnerabilities for mobiles
- Summary
- Chapter 4. Traffic Analysis for Android Devices
- Android traffic interception
- Ways to analyze Android traffic
- HTTPS Proxy interception
- Extracting sensitive files with packet capture
- Summary
- Chapter 5. Android Forensics
- Types of forensics
- Filesystems
- Using dd to extract data
- Using Andriller to extract an application's data
- Using AFLogical to extract contacts calls and text messages
- Dumping application databases manually
- Logging the logcat
- Using backup to extract an application's data
- Summary
- Chapter 6. Playing with SQLite
- Understanding SQLite in depth
- Security vulnerability
- Summary
- Chapter 7. Lesser-known Android Attacks
- Android WebView vulnerability
- Infecting legitimate APKs
- Vulnerabilities in ad libraries
- Cross-Application Scripting in Android
- Summary
- Chapter 8. ARM Exploitation
- Introduction to ARM architecture
- Setting up the environment
- Simple stack-based buffer overflow
- Return-oriented programming
- Android root exploits
- Summary
- Chapter 9. Writing the Pentest Report
- Basics of a penetration testing report
- Writing the pentest report
- Summary
- Security Audit of
- Table of Contents
- 1. Introduction
- 2. Auditing and Methodology
- 3. Conclusions
- Index 更新時間:2021-07-16 12:14:06
推薦閱讀
- 白話網絡安全2:網安戰略篇
- Mobile Forensics Cookbook
- 白帽子講Web安全(紀念版)
- 深入淺出隱私計算:技術解析與應用實踐
- 數據安全實踐指南
- Kali Linux Network Scanning Cookbook(Second Edition)
- 網絡運維親歷記 (網絡運維紀實文學)
- 從實踐中學習Kali Linux滲透測試
- 可信計算3.0工程初步(第二版)
- 安全防御入門手冊
- 解密數據恢復
- 數據保護:工作負載的可恢復性
- 信息技術基礎:提高篇·實驗與習題
- 黑客攻防從入門到精通
- 白話零信任
- 信息內容安全管理及應用
- 數字銀行安全體系構建
- ATT&CK與威脅獵殺實戰
- ATT&CK視角下的紅藍對抗實戰指南
- Learning Metasploit Exploitation and Development
- 精通Veeam Backup&Replication(原書第2版)
- 網絡空間安全原理與實踐
- Burp Suite Essentials
- Implementing AppFog
- 構建可信白環境:方法與實踐
- Web安全漏洞原理及實戰
- 黑客攻防工具實戰從新手到高手(超值版)
- 網絡異常流量與行為分析
- 數據恢復實用技術
- 維護網絡空間安全:中國網絡安全法解讀