We’ve covered numerous tools and techniques in this book for performing security assessments of mobile technologies. This appendix summarizes many items from our consulting arsenal in one convenient location, providing a cheat sheet of sorts for anyone interested in quickly learning the basics of mobile pen testing. For deeper information on each tool, consult the relevant chapter in this book where it’s covered in greater detail (for example, Chapter 3 for iOS and Chapter 4 for Android, and also check out Chapters 5, 6, and 8 for mobile malware, mobile browser/service endpoint, and developer-oriented tools and techniques, respectively).

We’ve framed our cheat sheet within the generic process ...

Get Hacking Exposed Mobile now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.