Summary

In this chapter, we have discussed the concepts of locked and unlocked boot loaders and how to unlock locked boot loaders. We discussed rooting, its advantages and disadvantages, including the power it provides to access all the data while performing security analysis. Once we root a device, we can gain full access to the device's file system and explore the internals and the data associated with each application sitting on the device. We will explore these in a later chapter in this book. We have also seen how to root the device and the steps to install custom ROMs on Android devices.

Get Penetration Testing: A Survival Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.