Cargando…

Hacking Android.

Explore every nook and cranny of the Android OS to modify your device and guard it against security threatsAbout This Book Understand and counteract against offensive security threats to your applications Maximize your device's power and potential to suit your needs and curiosity See exactly ho...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kotipalli, Srinivasa Rao
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Packt Publishing, 2016.
Edición:1.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn955140515
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 160805s2016 xx o 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d YDXCP  |d NLE  |d OCLCO  |d OCLCQ  |d COO  |d FEM  |d EBLCP  |d MERUC  |d OCLCQ  |d VT2  |d REB  |d OCLCF  |d UOK  |d OCLCQ  |d WYU  |d OCLCO  |d LVT  |d OCLCQ  |d OCLCO  |d OCLCQ  |d UKMGB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB688283  |2 bnb 
016 7 |a 017898592  |2 Uk 
019 |a 957385909  |a 963270140  |a 964841692  |a 968006611  |a 969071692 
020 |a 1785888005  |q (ebk) 
020 |a 9781785888007  |q (ebk) 
020 |a 9781785883149 
020 |a 1785883143 
024 3 |a 9781785883149 
029 1 |a CHNEW  |b 000949055 
029 1 |a CHVBK  |b 483152293 
029 1 |a UKMGB  |b 017898592 
029 1 |a AU@  |b 000067113652 
029 1 |a AU@  |b 000058870957 
035 |a (OCoLC)955140515  |z (OCoLC)957385909  |z (OCoLC)963270140  |z (OCoLC)964841692  |z (OCoLC)968006611  |z (OCoLC)969071692 
037 |a 943052  |b MIL 
050 4 |a T55.4-60.8 
082 0 4 |a 005.2  |2 23 
049 |a UAMI 
100 1 |a Kotipalli, Srinivasa Rao. 
245 1 0 |a Hacking Android. 
250 |a 1. 
260 |b Packt Publishing,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
588 0 |a Print version record. 
520 8 |a Explore every nook and cranny of the Android OS to modify your device and guard it against security threatsAbout This Book Understand and counteract against offensive security threats to your applications Maximize your device's power and potential to suit your needs and curiosity See exactly how your smartphone's OS is put together (and where the seams are)Who This Book Is ForThis book is for anyone who wants to learn about Android security. Software developers, QA professionals, and beginner- to intermediate-level security professionals will find this book helpful. Basic knowledge of Android programming would be a plus. What You Will Learn Acquaint yourself with the fundamental building blocks of Android Apps in the right way Pentest Android apps and perform various attacks in the real world using real case studies Take a look at how your personal data can be stolen by malicious attackers Understand the offensive maneuvers that hackers use Discover how to defend against threats Get to know the basic concepts of Android rooting See how developers make mistakes that allow attackers to steal data from phones Grasp ways to secure your Android apps and devices Find out how remote attacks are possible on Android devicesIn DetailWith the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security. Hacking Android is a step-by-step guide that will get you started with Android security. You'll begin your journey at the absolute basics, and then will slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. On this journey you'll get to grips with various tools and techniques that can be used in your everyday pentests. You'll gain the skills necessary to perform Android application vulnerability assessment and penetration testing and will create an Android pentesting lab. Style and approachThis comprehensive guide takes a step-by-step approach and is explained in a conversational and easy-to-follow style. Each topic is explained sequentially in the process of performing a successful penetration test. We also include detailed explanations as well as screenshots of the basic and advanced concepts. 
505 0 |a Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Setting Up the Lab; Installing the required tools; Java; Android Studio; Setting up an AVD; Real device; Apktool; Dex2jar/JD-GUI; Burp Suite; Configuring the AVD; Drozer; Prerequisites; QARK (No support for windows); Getting ready; Advanced REST Client for Chrome; Droid Explorer; Cydia Substrate and Introspy; SQLite browser; Frida; Setting up Frida server; Setting up frida-client; Vulnerable apps; Kali Linux; ADB Primer; Checking for connected devices; Getting a shell. 
505 8 |a Listing the packagesPushing files to the device; Pulling files from the device; Installing apps using adb; Troubleshooting adb connections; Summary; Chapter 2: Android Rooting; What is rooting?; Why would we root a device?; Advantages of rooting; Unlimited control over the device; Installing additional apps; More features and customization; Disadvantages of rooting; It compromises the security of your device; Bricking your device; Voids warranty; Locked and unlocked boot loaders; Determining boot loader unlock status on Sony devices. 
505 8 |a Unlocking boot loader on Sony through a vendor specified methodRooting unlocked boot loaders on a Samsung device; Stock recovery and Custom recovery; Prerequisites; Rooting Process and Custom ROM installation; Installing recovery softwares; Using Odin; Using Heimdall; Rooting a Samsung Note 2; Flashing the Custom ROM to the phone; Summary; Chapter 3: Fundamental Building Blocks of Android Apps; Basics of Android apps; Android app structure; How to get an APK file?; Storage location of APK files; /data/app/; /system/app/; /data/app-private/; Android app components; Activities; Services. 
505 8 |a Broadcast receiversContent providers; Android app build process; Building DEX files from the command line; What happens when an app is run?; ART -- the new Android Runtime; Understanding app sandboxing; UID per app; App sandboxing; Is there a way to break out of this sandbox?; Summary; Chapter 4: Overview of Attacking Android Apps; Introduction to Android apps; Web Based apps; Native apps; Hybrid apps; Understanding the app's attack surface; Mobile application architecture; Threats at the client side; Threats at the backend; Guidelines for testing and securing mobile apps. 
505 8 |a OWASP Top 10 Mobile Risks (2014)M1: Weak Server-Side Controls; M2: Insecure Data Storage; M3: Insufficient Transport Layer Protection; M4: Unintended Data Leakage; M5: Poor Authorization and Authentication; M6: Broken Cryptography; M7: Client-Side Injection; M8: Security Decisions via Untrusted Inputs; M9: Improper Session Handling; M10: Lack of Binary Protections; Automated tools; Drozer; Performing Android security assessments with Drozer; Installing testapp.apk; Listing out all the modules; Retrieving package information; Identifying the attack surface. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Android (Electronic resource) 
630 0 7 |a Android (Electronic resource)  |2 fast 
650 0 |a Mobile computing  |x Security measures. 
650 6 |a Informatique mobile  |x Sécurité  |x Mesures. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4617086  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4617086 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34514595 
938 |a YBP Library Services  |b YANK  |n 13103884 
994 |a 92  |b IZTAP