Learning Pentesting for Android Devices: A Practical Guide to Learning Penetration Testing for Android Devices and Applications

Learning Pentesting for Android Devices: A Practical Guide to Learning Penetration Testing for Android Devices and Applications

Product ID: 12297447 Condition: USED (All books in used condition)

Payflex: Pay in 4 interest-free payments of R255.25. Learn more
R 1,021
includes Duties & VAT
Delivery: 10-20 working days
Ships from USA warehouse.
Secure Transaction
VISA Mastercard payflex ozow
Condition: USED (All books in used condition)

Product Description

Condition - Very Good

The item shows wear from consistent use but remains in good condition. It may arrive with damaged packaging or be repackaged.

Learning Pentesting for Android Devices: A Practical Guide to Learning Penetration Testing for Android Devices and Applications

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the application and get access to sensitive information. This is where penetration testing comes into play to check for various vulnerabilities. 
Learning Pentesting for Android is a practical and hands-on guide to take you from the very basic level of Android Security gradually to pentesting and auditing Android. It is a step-by-step guide, covering a variety of techniques and methodologies that you can learn and use in order to perform real life penetration testing on Android devices and applications. The book starts with the basics of Android Security and the permission model, which we will bypass using a custom application, written by us. Thereafter we will move to the internals of Android applications from a security point of view, and will reverse and audit them to find the security weaknesses using manual analysis as well as using automated tools. 
We will then move to a dynamic analysis of Android applications, where we will learn how to capture and analyze network traffic on Android devices and extract sensitive information and files from a packet capture from an Android device. We will look into SQLite databases, and learn to find and exploit the injection vulnerabilities. Also, we will look into root exploits, and how to exploit devices to get full access along with a reverse connect shell. Finally, we will learn how to write a penetration testing report for an Android application auditing project.

Technical Specifications

Country
USA
Brand
Packt Publishing
Manufacturer
Packt Pub Ltd
Binding
Paperback
ReleaseDate
2014-03-17T00:00:01Z
UnitCount
1
Format
Illustrated
EANs
9781783288984