Book description
Explore every nook and cranny of the Android OS to modify your device and guard it against security threats
About This Book
- Understand and counteract against offensive security threats to your applications
- Maximize your device's power and potential to suit your needs and curiosity
- See exactly how your smartphone's OS is put together (and where the seams are)
Who This Book Is For
This book is for anyone who wants to learn about Android security. Software developers, QA professionals, and beginner- to intermediate-level security professionals will find this book helpful. Basic knowledge of Android programming would be a plus.
What You Will Learn
- Acquaint yourself with the fundamental building blocks of Android Apps in the right way
- Pentest Android apps and perform various attacks in the real world using real case studies
- Take a look at how your personal data can be stolen by malicious attackers
- Understand the offensive maneuvers that hackers use
- Discover how to defend against threats
- Get to know the basic concepts of Android rooting
- See how developers make mistakes that allow attackers to steal data from phones
- Grasp ways to secure your Android apps and devices
- Find out how remote attacks are possible on Android devices
In Detail
With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.
Hacking Android is a step-by-step guide that will get you started with Android security. You'll begin your journey at the absolute basics, and then will slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. On this journey you'll get to grips with various tools and techniques that can be used in your everyday pentests. You'll gain the skills necessary to perform Android application vulnerability assessment and penetration testing and will create an Android pentesting lab.
Style and approach
This comprehensive guide takes a step-by-step approach and is explained in a conversational and easy-to-follow style. Each topic is explained sequentially in the process of performing a successful penetration test. We also include detailed explanations as well as screenshots of the basic and advanced concepts.
Publisher resources
Table of contents
-
Hacking Android
- Table of Contents
- Hacking Android
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Preface
- 1. Setting Up the Lab
- 2. Android Rooting
- 3. Fundamental Building Blocks of Android Apps
-
4. Overview of Attacking Android Apps
- Introduction to Android apps
- Understanding the app's attack surface
- Threats at the client side
- Threats at the backend
-
Guidelines for testing and securing mobile apps
- OWASP Top 10 Mobile Risks (2014)
- M1: Weak Server-Side Controls
- M2: Insecure Data Storage
- M3: Insufficient Transport Layer Protection
- M4: Unintended Data Leakage
- M5: Poor Authorization and Authentication
- M6: Broken Cryptography
- M7: Client-Side Injection
- M8: Security Decisions via Untrusted Inputs
- M9: Improper Session Handling
- M10: Lack of Binary Protections
- Automated tools
- Identifying the attack surface
- QARK (Quick Android Review Kit)
- Summary
- 5. Data Storage and Its Security
-
6. Server-Side Attacks
- Different types of mobile apps and their threat model
- Mobile applications server-side attack surface
-
Strategies for testing mobile backend
- Setting up Burp Suite Proxy for testing
- Bypassing certificate pinning
- Bypass SSL pinning using AndroidSSLTrustKiller
- Threats at the backend
- Summary
- 7. Client-Side Attacks – Static Analysis Techniques
-
8. Client-Side Attacks – Dynamic Analysis Techniques
-
Automated Android app assessments using Drozer
- Listing out all the modules
- Retrieving package information
- Finding out the package name of your target application
- Getting information about a package
- Dumping the AndroidManifes.xml file
- Finding out the attack surface:
- Attacks on activities
- Attacks on services
- Broadcast receivers
- Content provider leakage and SQL Injection using Drozer
- Attacking SQL Injection using Drozer
- Path traversal attacks in content providers
- Exploiting debuggable apps
- Introduction to Cydia Substrate
- Runtime monitoring and analysis using Introspy
- Hooking using Xposed framework
- Dynamic instrumentation using Frida
- Logging based vulnerabilities
- WebView attacks
- Summary
-
Automated Android app assessments using Drozer
- 9. Android Malware
- 10. Attacks on Android Devices
- Index
Product information
- Title: Hacking Android
- Author(s):
- Release date: July 2016
- Publisher(s): Packt Publishing
- ISBN: 9781785883149
You might also like
book
The Time Cleanse: A Proven System to Eliminate Wasted Time, Realize Your Full Potential, and Reinvest in What Matters Most
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …
book
Trust Factor
For decades, alarms have sounded about declining engagement. Yet companies continue to struggle with toxic cultures, …
video
Full Stack Web Development Mastery Course - Novice to Expert
Full stack development refers to the development of both frontend (client-side) and backend (server-side) portions of …
video
Introduction to ChatGPT and OpenAI
OpenAI ChatGPT is a powerful language model that uses advanced ML techniques to generate human-like text …