Book description
See your app through a hacker's eyes to find the real sources of vulnerability
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.
Understand the ways data can be stored, and how cryptography is defeated
Set up an environment for identifying insecurities and the data leakages that arise
Develop extensions to bypass security controls and perform injection attacks
Learn the different attacks that apply specifically to cross-platform apps
IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.
Table of contents
- Introduction
- Chapter 1 Mobile Application (In)security
- Chapter 2 Analyzing iOS Applications
- Chapter 3 Attacking iOS Applications
- Chapter 4 Identifying iOS Implementation Insecurities
- Chapter 5 Writing Secure iOS Applications
- Chapter 6 Analyzing Android Applications
- Chapter 7 Attacking Android Applications
- Chapter 8 Identifying and Exploiting Android Implementation Issues
- Chapter 9 Writing Secure Android Applications
- Chapter 10 Analyzing Windows Phone Applications
- Chapter 11 Attacking Windows Phone Applications
- Chapter 12 Identifying Windows Phone Implementation Issues
-
Chapter 13 Writing Secure Windows Phone Applications
- General Security Design Considerations
- Storing and Encrypting Data Securely
- Secure Random Number Generation
- Securing Data in Memory and Wiping Memory
- Avoiding SQLite Injection
- Implementing Secure Communications
- Avoiding Cross-Site Scripting in WebViews and WebBrowser Components
- Secure XML Parsing
- Clearing Web Cache and Web Cookies
- Avoiding Native Code Bugs
- Using Exploit Mitigation Features
- Summary
- Chapter 14 Analyzing BlackBerry Applications
- Chapter 15 Attacking BlackBerry Applications
- Chapter 16 Identifying BlackBerry Application Issues
- Chapter 17 Writing Secure BlackBerry Applications
- Chapter 18 Cross-Platform Mobile Applications
- Title page
- Copyright
- Dedication
- About the Authors
- About the Technical Editor
- Credits
- Acknowledgments
- EULA
Product information
- Title: The Mobile Application Hacker's Handbook
- Author(s):
- Release date: February 2015
- Publisher(s): Wiley
- ISBN: 9781118958506
You might also like
book
The Car Hacker's Handbook
Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and …
book
The Web Application Hacker's Handbook, 2nd Edition
The highly successful security book returns with a new edition, completely updated Web applications are the …
book
The Hardware Hacking Handbook
Embedded devices are chip-size microcomputers small enough to be included in the structure of the object …
book
The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical …