Hacking Android

· Packt Publishing Ltd
3.9
36 āļĢāļĩāļ§āļīāļ§
eBook
376
āļŦāļ™āđ‰āļē
āļ„āļ°āđāļ™āļ™āđāļĨāļ°āļĢāļĩāļ§āļīāļ§āđ„āļĄāđˆāđ„āļ”āđ‰āļĢāļąāļšāļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļšāļĒāļ·āļ™āļĒāļąāļ™ Â āļ”āļđāļ‚āđ‰āļ­āļĄāļđāļĨāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄ

āđ€āļāļĩāđˆāļĒāļ§āļāļąāļš eBook āđ€āļĨāđˆāļĄāļ™āļĩāđ‰

Explore every nook and cranny of the Android OS to modify your device and guard it against security threatsAbout This BookUnderstand and counteract against offensive security threats to your applicationsMaximize your device's power and potential to suit your needs and curiositySee exactly how your smartphone's OS is put together (and where the seams are)Who This Book Is For

This book is for anyone who wants to learn about Android security. Software developers, QA professionals, and beginner- to intermediate-level security professionals will find this book helpful. Basic knowledge of Android programming would be a plus.

What You Will LearnAcquaint yourself with the fundamental building blocks of Android Apps in the right wayPentest Android apps and perform various attacks in the real world using real case studiesTake a look at how your personal data can be stolen by malicious attackersUnderstand the offensive maneuvers that hackers useDiscover how to defend against threatsGet to know the basic concepts of Android rootingSee how developers make mistakes that allow attackers to steal data from phonesGrasp ways to secure your Android apps and devicesFind out how remote attacks are possible on Android devicesIn Detail

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.

Hacking Android is a step-by-step guide that will get you started with Android security. You'll begin your journey at the absolute basics, and then will slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. On this journey you'll get to grips with various tools and techniques that can be used in your everyday pentests. You'll gain the skills necessary to perform Android application vulnerability assessment and penetration testing and will create an Android pentesting lab.

Style and approach

This comprehensive guide takes a step-by-step approach and is explained in a conversational and easy-to-follow style. Each topic is explained sequentially in the process of performing a successful penetration test. We also include detailed explanations as well as screenshots of the basic and advanced concepts.

āļāļēāļĢāđƒāļŦāđ‰āļ„āļ°āđāļ™āļ™āđāļĨāļ°āļĢāļĩāļ§āļīāļ§

3.9
36 āļĢāļĩāļ§āļīāļ§

āđ€āļāļĩāđˆāļĒāļ§āļāļąāļšāļœāļđāđ‰āđāļ•āđˆāļ‡

Srinivasa Rao Kotipalli (@srini0x00) is a security researcher from India. He has extensive hands-on experience in performing web application, infrastructure, and mobile security assessments. He worked as a security consultant at Tata Consultancy Services India for two and a half years and later joined a start-up in Malaysia. He has delivered training sessions on web, infrastructure, and mobile penetration testing for organizations across the world, in countries such as India, Malaysia, Brunei, and Vietnam. Through responsible disclosure programs, he has reported vulnerabilities in many top-notch organizations. He holds a bachelor's degree in information technology and is OSCP certified. He blogs at www.androidpentesting.com and www.infosecinstitute.com.

Mohammed A. Imran (@secfigo) is an experienced application security engineer and the founder of null Singapore and null Hyderabad. With more than 6 years of experience in product security and consulting, he spends most of his time on penetration testing, vulnerability assessments, and source code reviews of web and mobile applications. He has helped telecom, banking, and software development houses create and maintain secure SDLC programs. He has also created and delivered training on application security and secure coding practices to students, enterprises, and government organizations. He holds a master's degree in computer science and is actively involved in the information security community and organizes meetups regularly.

āđƒāļŦāđ‰āļ„āļ°āđāļ™āļ™ eBook āļ™āļĩāđ‰

āđāļŠāļ”āļ‡āļ„āļ§āļēāļĄāđ€āļŦāđ‡āļ™āļ‚āļ­āļ‡āļ„āļļāļ“āđƒāļŦāđ‰āđ€āļĢāļēāļĢāļąāļšāļĢāļđāđ‰

āļ‚āđ‰āļ­āļĄāļđāļĨāđƒāļ™āļāļēāļĢāļ­āđˆāļēāļ™

āļŠāļĄāļēāļĢāđŒāļ—āđ‚āļŸāļ™āđāļĨāļ°āđāļ—āđ‡āļšāđ€āļĨāđ‡āļ•
āļ•āļīāļ”āļ•āļąāđ‰āļ‡āđāļ­āļ› Google Play Books āļŠāļģāļŦāļĢāļąāļš Android āđāļĨāļ° iPad/iPhone āđāļ­āļ›āļˆāļ°āļ‹āļīāļ‡āļ„āđŒāđ‚āļ”āļĒāļ­āļąāļ•āđ‚āļ™āļĄāļąāļ•āļīāļāļąāļšāļšāļąāļāļŠāļĩāļ‚āļ­āļ‡āļ„āļļāļ“ āđāļĨāļ°āļŠāđˆāļ§āļĒāđƒāļŦāđ‰āļ„āļļāļ“āļ­āđˆāļēāļ™āđāļšāļšāļ­āļ­āļ™āđ„āļĨāļ™āđŒāļŦāļĢāļ·āļ­āļ­āļ­āļŸāđ„āļĨāļ™āđŒāđ„āļ”āđ‰āļ—āļļāļāļ—āļĩāđˆ
āđāļĨāđ‡āļ›āļ—āđ‡āļ­āļ›āđāļĨāļ°āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāđŒ
āļ„āļļāļ“āļŸāļąāļ‡āļŦāļ™āļąāļ‡āļŠāļ·āļ­āđ€āļŠāļĩāļĒāļ‡āļ—āļĩāđˆāļ‹āļ·āđ‰āļ­āļˆāļēāļ Google Play āđ‚āļ”āļĒāđƒāļŠāđ‰āđ€āļ§āđ‡āļšāđ€āļšāļĢāļēāļ§āđŒāđ€āļ‹āļ­āļĢāđŒāđƒāļ™āļ„āļ­āļĄāļžāļīāļ§āđ€āļ•āļ­āļĢāđŒāđ„āļ”āđ‰
eReader āđāļĨāļ°āļ­āļļāļ›āļāļĢāļ“āđŒāļ­āļ·āđˆāļ™āđ†
āļŦāļēāļāļ•āđ‰āļ­āļ‡āļāļēāļĢāļ­āđˆāļēāļ™āļšāļ™āļ­āļļāļ›āļāļĢāļ“āđŒ e-ink āđ€āļŠāđˆāļ™ Kobo eReader āļ„āļļāļ“āļˆāļ°āļ•āđ‰āļ­āļ‡āļ”āļēāļ§āļ™āđŒāđ‚āļŦāļĨāļ”āđāļĨāļ°āđ‚āļ­āļ™āđ„āļŸāļĨāđŒāđ„āļ›āļĒāļąāļ‡āļ­āļļāļ›āļāļĢāļ“āđŒāļ‚āļ­āļ‡āļ„āļļāļ“ āđ‚āļ›āļĢāļ”āļ—āļģāļ•āļēāļĄāļ§āļīāļ˜āļĩāļāļēāļĢāļ­āļĒāđˆāļēāļ‡āļĨāļ°āđ€āļ­āļĩāļĒāļ”āđƒāļ™āļĻāļđāļ™āļĒāđŒāļŠāđˆāļ§āļĒāđ€āļŦāļĨāļ·āļ­āđ€āļžāļ·āđˆāļ­āđ‚āļ­āļ™āđ„āļŸāļĨāđŒāđ„āļ›āļĒāļąāļ‡ eReader āļ—āļĩāđˆāļĢāļ­āļ‡āļĢāļąāļš