Ebook: Mobile Device Exploitation Cookbook
Author: Prashant Verma Akshay Dixit
- Tags: Programming, APIs & Operating Environments, Algorithms, Apple Programming, Cross-platform Development, Functional, Game Programming, Graphics & Multimedia, Introductory & Beginning, Languages & Tools, Microsoft Programming, Mobile Apps, Parallel Programming, Software Design Testing & Engineering, Web Programming, Computers & Technology, Handheld & Mobile Devices, Mobile Phones Tablets & E-Readers, Computers & Technology, Programming & App Development, Mobile Phones Tablets & E-Readers, Computers & Technology, Secu
- Year: 2016
- Publisher: Packt Publishing
- Language: English
- epub
Over 40 recipes to master mobile device penetration testing with open source tools
About This Book
- Learn application exploitation for popular mobile platforms
- Improve the current security level for mobile platforms and applications
- Discover tricks of the trade with the help of code snippets and screenshots
Who This Book Is For
This book is intended for mobile security enthusiasts and penetration testers who wish to secure mobile devices to prevent attacks and discover vulnerabilities to protect devices.
What You Will Learn
- Install and configure Android SDK and ADB
- Analyze Android Permission Model using ADB and bypass Android Lock Screen Protection
- Set up the iOS Development Environment - Xcode and iOS Simulator
- Create a Simple Android app and iOS app and run it in Emulator and Simulator respectively
- Set up the Android and iOS Pentesting Environment
- Explore mobile malware, reverse engineering, and code your own malware
- Audit Android and iOS apps using static and dynamic analysis
- Examine iOS App Data storage and Keychain security vulnerabilities
- Set up the Wireless Pentesting Lab for Mobile Devices
- Configure traffic interception with Android and intercept Traffic using Burp Suite and Wireshark
- Attack mobile applications by playing around with traffic and SSL certificates
- Set up the Blackberry and Windows Phone Development Environment and Simulator
- Setting up the Blackberry and Windows Phone Pentesting Environment
- Steal data from Blackberry and Windows
Download the book Mobile Device Exploitation Cookbook for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)