Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
111
Behavioral analysis
On the upstream machine
FakeDNS—Used to direct all DNS requests to a single
host.
FakeHTTP—Used as a generic Web server to host les.
Proxy Server—Used to obscure your actual location.
Wireshark—Used to capture all the netow trac pass-
ing through the machine.
Other helpful applications to have on hand include the SQL Database
Browser to read databases retrieved o the device and SQL Commander
to browse the device and move les on and o it.
Installing Samples to Devices and Emulators
Once the device is up, Eclipse will automatically see it and open
access to the monitoring tools under the DDMS perspective; but rst
you have to get something on the device to monitor. To get a sample
into your environment for testing ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200