Cargando…

Android Security Cookbook.

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Makan, Keith
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Packt Publishing, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000007a 4500
001 EBOOKCENTRAL_ocn866840167
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 131227s2013 xx o 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d E7B  |d MHW  |d S4S  |d OCLCQ  |d MEAUC  |d DEBSZ  |d OCLCO  |d OCLCQ  |d COO  |d YDXCP  |d OCLCQ  |d FEM  |d COCUF  |d CNNOR  |d MOR  |d PIFAG  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d STF  |d OCLCF  |d NRAMU  |d ICG  |d INT  |d VT2  |d OCLCQ  |d OCLCO  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d OCLCO  |d DKC  |d AU@  |d OCLCQ  |d OCLCO  |d QGK  |d OCLCQ  |d OCLCO 
019 |a 961628017  |a 962641396  |a 968011143  |a 969007913  |a 1259093613 
020 |a 1306254256  |q (ebk) 
020 |a 9781306254250  |q (ebk) 
020 |a 9781782167174 
020 |a 178216717X 
020 |a 9781782167167 
020 |a 1782167161 
024 3 |a 9781306254250 
029 1 |a CHNEW  |b 000899893 
029 1 |a CHVBK  |b 40339757X 
029 1 |a DEBBG  |b BV044065990 
029 1 |a DEBSZ  |b 405568983 
029 1 |a NZ1  |b 15912161 
035 |a (OCoLC)866840167  |z (OCoLC)961628017  |z (OCoLC)962641396  |z (OCoLC)968011143  |z (OCoLC)969007913  |z (OCoLC)1259093613 
037 |a 556676  |b MIL 
050 4 |a QA76.774.A53  |b M34 2013eb 
082 0 4 |a 005.258 
049 |a UAMI 
100 1 |a Makan, Keith. 
245 1 0 |a Android Security Cookbook. 
260 |b Packt Publishing,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from. 
588 0 |a Print version record. 
505 0 |a Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB. 
505 8 |a Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers. 
505 8 |a Determining application attack surfacesLaunching activities; Writing a drozer module -- a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications. 
505 8 |a Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode. 
505 8 |a Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Android (Electronic resource) 
630 0 7 |a Android (Electronic resource)  |2 fast 
650 0 |a Operating systems (Computers)  |x Security measures. 
650 0 |a Smartphones  |x Security measures. 
650 6 |a Systèmes d'exploitation (Ordinateurs)  |x Sécurité  |x Mesures. 
650 6 |a Téléphones intelligents  |x Sécurité  |x Mesures. 
650 7 |a Operating systems (Computers)  |x Security measures  |2 fast 
776 0 8 |i Print version:  |z 9781306254250 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1593872  |z Texto completo 
936 |a BATCHLOAD 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1593872 
938 |a ebrary  |b EBRY  |n ebr10825546 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis27167496 
938 |a YBP Library Services  |b YANK  |n 11465207 
994 |a 92  |b IZTAP