Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
154
android Malware and analysis
Host Requirements
Before taking the rst steps to start the conguration and installation
of the sandbox, you should set the operating system you have chosen
to perform all the functionalities. We will help you with the follow-
ing steps if you have chosen Debian or a similar base system. We will
separate the installation of this base in dierent points.
Operating System
To identify in which operating system you have, execute the follow-
ing command:
ama@ama:~$ uname -a
Linux r2 3.2.0-4-amd64 #1 SMP Debian 3.2.41-2 x86_64
GNU/LinuX
First, we update all the repositories of Debian 7 and the software
that may or may not be outdated.
ama@ama:~$ sudo apt-get update && sudo apt-get upgrade
is sequence of commands will ret ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200