Mobile Device Exploitation Cookbook

0
(0)

Mobile Device Exploitation Cookbook
 

  • Author:Akshay DixitPrashant Verma
  • Length: 320 pages
  • Edition: 1
  • Publisher: Packt Publishing
  • Publication Date: 2016-06-30
  • ISBN-10: 1783558725
  • ISBN-13: 9781783558728
  • Sales Rank: #4386358 (See Top 100 Books)
  • Download:Register/Login to Download
  • Buy Print:Buy from amazon


    Book Description

    Over 40 recipes to master mobile device penetration testing with open source tools About This Book Learn application exploitation for popular mobile platforms Improve the current security level for mobile platforms and applications Discover tricks of the trade with the help of code snippets and screenshots Who This Book Is For This book is intended for mobile security enthusiasts and penetration testers who wish to secure mobile devices to prevent attacks and discover vulnerabilities to protect devices. What You Will Learn Install and configure Android SDK and ADB Analyze Android Permission Model using ADB and bypass Android Lock Screen Protection Set up the iOS Development Environment – Xcode and iOS Simulator Create a Simple Android app and iOS app and run it in Emulator and Simulator respectively Set up the Android and iOS Pentesting Environment Explore mobile malware, reverse engineering, and code your own malware Audit Android and iOS apps using static and dynamic analysis Examine iOS App Data storage and Keychain security vulnerabilities Set up the Wireless Pentesting Lab for Mobile Devices Configure traffic interception with Android and intercept Traffic using Burp Suite and Wireshark Attack mobile applications by playing around with traffic and SSL certificates Set up the Blackberry and Windows Phone Development Environment and Simulator Setting up the Blackberry and Windows Phone Pentesting Environment Steal data from Blackberry and Windows phones applications In Detail Mobile attacks are on the rise. We are adapting ourselves to new and improved smartphones, gadgets, and their accessories, and with this network of smart things, come bigger risks. Threat exposure increases and the possibility of data losses increase. Exploitations of mobile devices are significant sources of such attacks. Mobile devices come with different platforms, such as Android and iOS. Each platform has its own feature-set,

    Table of Contents

    Chapter 1: Introduction to Mobile Security
    Chapter 2: Mobile Malware-Based Attacks
    Chapter 3: Auditing Mobile Applications
    Chapter 4: Attacking Mobile Application Traffic
    Chapter 5: Working with Other Platforms

    中文:

    书名:移动设备开发手册

    超过40食谱掌握移动设备渗透测试与开源工具关于本书学习流行的移动平台的应用程序开发,提高移动平台和应用程序的当前安全级别发现行业诀窍与代码片段和截图的帮助谁本书是为移动安全爱好者和渗透测试员谁希望保护移动设备,以防止攻击和发现漏洞,以保护设备。您将了解到的安装和配置Android SDK和ADB使用ADB分析Android权限模型并绕过Android锁屏保护设置iOS开发环境–Xcode和iOS模拟器创建一个简单的Android应用程序和iOS应用程序并在模拟器和模拟器中运行分别设置Android和iOS五层测试环境探索移动恶意软件,反向工程,并编写自己的恶意软件使用静态和动态分析审核Android和iOS应用程序使用静态和动态分析检查iOS应用程序数据存储和钥匙链安全漏洞设置移动设备无线五层测试实验室配置Android流量拦截并使用Burp Suite和Wireshark拦截流量通过玩弄流量和SSL证书攻击移动应用程序设置Blackberry和Windows Phone开发环境和模拟器设置Blackberry和Windows Phone五层测试环境从黑莓和Windows Phone应用程序窃取数据详细说明移动攻击正在上升。我们正在适应新的和改进的智能手机、小工具及其配件,随着这个智能事物网络的到来,更大的风险也随之而来。威胁暴露增加,数据丢失的可能性增加。利用移动设备进行攻击是此类攻击的重要来源。移动设备配备了不同的平台,如Android和iOS。每个平台都有自己的功能集,

    目录表

    第1章:移动安全简介
    第2章:基于移动恶意软件的攻击
    第3章:审核移动应用程序
    第4章:攻击移动应用流量
    第5章:使用其他平台

  • 下载电子版:下载地址
  • 购买纸质版:亚马逊商城

    点击星号评分!

    平均分 0 / 5. 投票数: 0

    还没有投票!请为他投一票。

  • 推荐阅读

    评论 抢沙发

    评论前必须登录!

     

    登录

    找回密码

    注册