Mobile Device Exploitation Cookbook Front Cover

Mobile Device Exploitation Cookbook

  • Length: 320 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2016-06-30
  • ISBN-10: 1783558725
  • ISBN-13: 9781783558728
  • Sales Rank: #4386358 (See Top 100 Books)
Description

Over 40 recipes to master mobile device penetration testing with open source tools About This Book Learn application exploitation for popular mobile platforms Improve the current security level for mobile platforms and applications Discover tricks of the trade with the help of code snippets and screenshots Who This Book Is For This book is intended for mobile security enthusiasts and penetration testers who wish to secure mobile devices to prevent attacks and discover vulnerabilities to protect devices. What You Will Learn Install and configure Android SDK and ADB Analyze Android Permission Model using ADB and bypass Android Lock Screen Protection Set up the iOS Development Environment – Xcode and iOS Simulator Create a Simple Android app and iOS app and run it in Emulator and Simulator respectively Set up the Android and iOS Pentesting Environment Explore mobile malware, reverse engineering, and code your own malware Audit Android and iOS apps using static and dynamic analysis Examine iOS App Data storage and Keychain security vulnerabilities Set up the Wireless Pentesting Lab for Mobile Devices Configure traffic interception with Android and intercept Traffic using Burp Suite and Wireshark Attack mobile applications by playing around with traffic and SSL certificates Set up the Blackberry and Windows Phone Development Environment and Simulator Setting up the Blackberry and Windows Phone Pentesting Environment Steal data from Blackberry and Windows phones applications In Detail Mobile attacks are on the rise. We are adapting ourselves to new and improved smartphones, gadgets, and their accessories, and with this network of smart things, come bigger risks. Threat exposure increases and the possibility of data losses increase. Exploitations of mobile devices are significant sources of such attacks. Mobile devices come with different platforms, such as Android and iOS. Each platform has its own feature-set,

Table of Contents

Chapter 1: Introduction to Mobile Security
Chapter 2: Mobile Malware-Based Attacks
Chapter 3: Auditing Mobile Applications
Chapter 4: Attacking Mobile Application Traffic
Chapter 5: Working with Other Platforms

To access the link, solve the captcha.