Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

Penetration Testing and Smartphones

When it comes to mobile malware defense, it’s a best practice to set realistic policy and security templates for each type of authorized device, and to become familiar with the devices used and their vulnerabilities. The best way to do this is to test the security measures in place via penetration testing (pentesting) on sample phones or emulators.

Pentesting smartphones involves the following stages:

  • Recon—During this stage, the tester gathers information by identifying the types of mobile devices on the target network.
  • Scanning—After the types of phones have been identified, the scanning phase can proceed. When scanning for mobile devices, the tester looks to identify networks sought out by mobile devices. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733