Download Mobile Device Exploitation Cookbook PDF

TitleMobile Device Exploitation Cookbook
Sub TitleOver 40 recipes to master mobile device penetration testing with open source tools
AuthorAkshay Dixit Prashant Verma
CategoryComputer & Programming
File Size9.2 MB
Total Download81

Over 40 recipes to master mobile device penetration testing with open source tools About This Book Learn application exploitation for popular mobile platforms Improve the current security level for mobile platforms and applications Discover tricks of the trade with the help of code snippets and screenshots Who This Book Is For This book is intended for mobile security enthusiasts and penetration testers who wish to secure mobile devices to prevent attacks and discover vulnerabilities to protect devices. What You Will Learn Install and configure Android SDK and ADB Analyze Android Permission Model using ADB and bypass Android Lock Screen Protection Set up the iOS Development Environment – Xcode and iOS Simulator Create a Simple Android app and iOS app and run it in Emulator and Simulator respectively Set up the Android and iOS Pentesting Environment Explore mobile malware, reverse engineering, and code your own malware Audit Android and iOS apps using static and dynamic analysis Examine iOS App Data storage and Keychain security vulnerabilities Set up the Wireless Pentesting Lab for Mobile Devices Configure traffic interception with Android and intercept Traffic using Burp Suite and Wireshark Attack mobile applications by playing around with traffic and SSL certificates Set up the Blackberry and Windows Phone Development Environment and Simulator Setting up the Blackberry and Windows Phone Pentesting Environment Steal data from Blackberry and Windows phones applications In Detail Mobile attacks are on the rise. We are adapting ourselves to new and improved smartphones, gadgets, and their accessories, and with this network of smart things, come bigger risks. Threat exposure increases and the possibility of data losses increase. Exploitations of mobile devices are significant sources of such attacks. Mobile devices come with different platforms, such as Android and iOS. Each platform has its own feature-set

Similar Free PDFs
Dynamic SQL, 2nd Edition

  • 508 Pages
  • 2019
  • English

Mathematica Data Visualization

  • 143 Pages
  • 2014
  • English

Microsoft SQL Server 2012 Bible

  • 1416 Pages
  • 2012
  • English

Designing Games

  • 416 Pages
  • 2013
  • English

Advanced Topics in C

  • 304 Pages
  • 2013
  • English

Learning Yeoman

  • 288 Pages
  • 2014
  • English

Python Machine Learning

  • 454 Pages
  • 2015
  • English