售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Mobile Device Exploitation Cookbook
Mobile Device Exploitation Cookbook
Credits
About the Authors
About the Reviewer
www.PacktPub.com
eBooks, discount offers, and more
Why subscribe?
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Conventions
Reader feedback
Customer support
Downloading the example code
Errata
Piracy
Questions
1. Introduction to Mobile Security
Introduction
Installing and configuring Android SDK and ADB
Getting ready
How to do it...
How it works...
There's more...
See also
Creating a simple Android app and running it in an emulator
Getting ready
How to do it...
See also
Analyzing the Android permission model using ADB
Getting ready
How to do it...
How it works...
There's more...
See also
Bypassing Android lock screen protection
Getting ready
How to do it...
How it works...
There's more...
Setting up the iOS development environment - Xcode and iOS simulator
Getting ready
How to do it...
How it works...
There's more...
See also
Creating a simple iOS app and running it in the simulator
Getting ready
How to do it...
How it works...
There's more...
See also
Setting up the Android pentesting environment
Getting ready
How to do it...
How it works...
There's more...
Setting up the iOS pentesting environment
Getting ready
How to do it...
How it works...
There's more...
Introduction to rooting and jailbreaking
Getting ready
How to do it...
Rooting
Jailbreaking
How it works...
Rooting
Jailbreaking
2. Mobile Malware-Based Attacks
Introduction
Analyzing an Android malware sample
Getting ready
How to do it...
How it works...
There's more...
Using Androguard for malware analysis
Getting ready
How to do it...
There's more...
Writing custom malware for Android from scratch
Getting ready
How to do it...
How it works...
There's more...
See also
Permission model bypassing in Android
Getting ready
How to do it...
How it works...
There's more...
See also
Reverse engineering iOS applications
Getting ready
How to do it...
How it works...
Analyzing malware in the iOS environment
Getting ready
How to do it...
How it works...
3. Auditing Mobile Applications
Introduction
Auditing Android apps using static analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Auditing Android apps a using a dynamic analyzer
Getting ready
How to do it...
How it works...
There's more...
See also
Using Drozer to find vulnerabilities in Android applications
Getting ready
How to do it...
How it works...
There's more...
See also
Auditing iOS application using static analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Auditing iOS application using a dynamic analyzer
Getting ready
How to do it...
How it works...
There's more...
See also
Examining iOS App Data storage and Keychain security vulnerabilities
Getting ready
How to do it...
How it works...
There's more...
Finding vulnerabilities in WAP-based mobile apps
Getting ready
How to do it...
There's more...
See also
Finding client-side injection
Getting ready
How to do it...
There's more...
See also
Insecure encryption in mobile apps
Getting ready
How to do it...
How it works...
An example of weak custom implementation
There's more...
See also
Discovering data leakage sources
Getting ready
How to do it...
How it works...
There's more...
See also
Other application-based attacks in mobile devices
Getting ready
How to do it...
How it works...
M5: Poor Authorization and Authentication
M8: Security Decisions via Untrusted Inputs
M9: Improper Session Handling
See also
Launching intent injection in Android
Getting ready
How to do it...
How it works...
There's more...
See also
4. Attacking Mobile Application Traffic
Introduction
Setting up the wireless pentesting lab for mobile devices
Getting ready
How to do it...
How it works...
There's more...
See also
Configuring traffic interception with Android
Getting ready
How to do it...
How it works...
There's more...
See also
Intercepting traffic using Burp Suite and Wireshark
Getting ready
How to do it...
How it works...
There's more...
See also
Using MITM proxy to modify and attack
Getting ready
How to do it...
How it works...
There's more...
See also
Configuring traffic interception with iOS
Getting ready
How to do it...
How it works...
There's more...
See also
Analyzing traffic and extracting sensitive information from iOS App traffic
Getting ready
How to do it...
There's more...
See also
WebKit attacks on mobile applications
Getting ready
How to do it...
How it works...
There's more...
See also
Performing SSL traffic interception by certificate manipulation
Getting ready
How to do it...
How it works...
There's more...
See also
Using a mobile configuration profile to set up a VPN and intercept traffic in iOS devices
Getting ready
How to do it...
How it works...
There's more...
See also
Bypassing SSL certificate validation in Android and iOS
Getting ready
How to do it...
How it works...
There's more...
See also
5. Working with Other Platforms
Introduction
Setting up the Blackberry development environment and simulator
Getting ready
How to do it...
How it works...
There's more...
See also
Setting up the Blackberry pentesting environment
Getting ready
How to do it...
How it works...
There's more...
See also
Setting up the Windows phone development environment and simulator
Getting ready
How to do it...
How it works...
There's more...
See also
Setting up the Windows phone pentesting environment
Getting ready
How to do it...
How it works...
There's more...
See also
Configuring traffic interception settings for Blackberry phones
Getting ready
How to do it...
Case 1 - Using MDS server and Blackberry simulator
Case 2 - Blackberry 10 simulators
Case 3 - Blackberry 10 phones
How it works...
There's more...
See also
Stealing data from Windows phones applications
Getting ready
How it works...
There's more...
See also
Stealing data from Blackberry applications
Getting ready
How to do it...
How it works...
There's more...
See also
Reading local data in Windows phone
Getting ready
How to do it...
How it works...
There's more...
See also
NFC-based attacks
Getting ready
How to do it...
How it works...
Eavesdropping
Data tampering
Data fuzzing
There's more...
See also
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜