Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
Learning Pentesting for Android Devices
 
Agrandissez cette image
 

Learning Pentesting for Android Devices [Format Kindle]

Aditya Gupta

Prix conseillé : EUR 14,41 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 23,53
Prix Kindle : EUR 10,09 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 13,44 (57%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 10,09  
Broché EUR 23,53  

Auteurs, publiez directement sur Kindle !

KDP
Via notre service de Publication Directe sur Kindle, publiez vous-même vos livres dans la boutique Kindle d'Amazon. C'est rapide, simple et totalement gratuit.



Le Pack de la Rentrée : 24 applis offertes, plus de 50 euros d'économies, jusqu'au 4 septembre sur l'App-Shop pour Android. Profitez-en et partagez la nouvelle. En savoir plus.


Descriptions du produit

Présentation de l'éditeur

In Detail

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the application and get access to sensitive information. This is where penetration testing comes into play to check for various vulnerabilities.

Learning Pentesting for Android is a practical and hands-on guide to take you from the very basic level of Android Security gradually to pentesting and auditing Android. It is a step-by-step guide, covering a variety of techniques and methodologies that you can learn and use in order to perform real life penetration testing on Android devices and applications.

The book starts with the basics of Android Security and the permission model, which we will bypass using a custom application, written by us. Thereafter we will move to the internals of Android applications from a security point of view, and will reverse and audit them to find the security weaknesses using manual analysis as well as using automated tools.

We will then move to a dynamic analysis of Android applications, where we will learn how to capture and analyze network traffic on Android devices and extract sensitive information and files from a packet capture from an Android device. We will then learn some different ways of doing Android forensics and use tools such as Lime and Volatility. After that, we will look into SQLite databases, and learn to find and exploit the injection vulnerabilities. Also, we will look into webkit-based vulnerabilities; root exploits, and how to exploit devices to get full access along with a reverse connect shell. Finally, we will learn how to write a penetration testing report for an Android application auditing project.

Approach

This is an easy-to-follow guide, full of hands-on and real-world examples of applications. Each of the vulnerabilities discussed in the book is accompanied with the practical approach to the vulnerability, and the underlying security issue.

Who this book is for

This book is intended for all those who are looking to get started in Android security or Android application penetration testing. You don’t need to be an Android developer to learn from this book, but it is highly recommended that developers have some experience in order to learn how to create secure applications for Android.


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 11877 KB
  • Nombre de pages de l'édition imprimée : 103 pages
  • Editeur : Packt Publishing (26 mars 2014)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00JAAW0ZY
  • Synthèse vocale : Activée
  • X-Ray :
  • Classement des meilleures ventes d'Amazon: n°211.350 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.5 étoiles sur 5  10 commentaires
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A good book for introduce in security of android app 2 juin 2014
Par abigail - Publié sur Amazon.com
Format:Broché
Hi! I think this is a good book that introduce in the most common attacks for the apps in android, like reverse engineering, intercept the network traffic, problems with javascript enable, or wiht wrong permission to the file, and with sql lite. Include a lot of tools and with example. I think is a little brief but It's an excellent introduction. Also includes an example of a report of vulnerabilities.
4.0 étoiles sur 5 good introductory book for Android security and vulnerabilities 22 juin 2014
Par ramakrishna - Publié sur Amazon.com
Format:Broché
This is a great book for those who would like to explore and experiment about android application and platform security. Authors have designed the book very well beginning with basics of android security architecture and going deeper into the nuances of the platform security. The tools that are explained here really helps the testers for auditing and perform reverse engineering the android applications and also helps in understanding different kinds of android vulnerabilities and attacks.
3.0 étoiles sur 5 Good reference for Android app's security audit 22 juin 2014
Par Priyanka Tyagi - Publié sur Amazon.com
Format:Broché
I’m still going through this book. I’ve picked up "Chapter 3: Reversing and Auditing Android Apps” to begin with and found totally comprehensive and filled with relevant information. This chapter briefly touches up on how to reverse engineer a Android application’s APK and quickly address the bigger security holes. This book targets both of the most popular operating systems: Windows and Unix based. Quick introduction to useful tools is really helpful for reference purpose. I’m looking forward to reading other chapters too. I would definitely keep this book as quick reference on Android security audits. The only reason I'm rating it 3 star just because I've not finished it yet. So far so good !
5.0 étoiles sur 5 A book to understand how an Android application works and how to make it more secure 19 juin 2014
Par Fabio Radin - Publié sur Amazon.com
Format:Broché
I really love this book! "Learning Pentesting for Android Devices" is a book for all curious guys that want to understand how things are working inside their Android device. The goal of the book is to explore which vulnerability and issues could be present in an Android application and how to prevent and to reveal them. This is just an interesting argument, but what is really more interesting is the way to reach this goal: becoming for a couple of hours an "hacker" and jump on the dark side of the development! Yes, because decompiling, reverse engineering, exploiting and attacking will be really more clear to you after reading this book!

The book starts with a couple of chapters about Android howtos: what is an Android app, how it is generated and which tools should be used to achieve the goal. After that, Aditya brings you on the reverse path: in chapter 3, starting from an app, he brings you to the source code! There is a very clear description about which tools could be used, how to use them and which limits you could experiencing during this adventure. In chapter 4, the classical network attacks are explored: network traffic analysis, proxy interception, man in the middle and so on.

More or less after an half of the book, Aditya starts with a very not so common description of Android vulnerability and attacks (from the device point of view!). This is really uncommon and very very interesting for understanding how the Android phone you have in pocket is made. A specific chapter is dedicated to SQLite, one of the most common SQL database deployed in several millions of devices and to the WebView, one of the most common Android widget.

In the end, even if this book is for every developer with a basic knowledge about Android programming, I must suggest it to everyone has intention to start and develop an Android app. Your app will be surely more secure in the end and there will be no risk about finding the source code of your app in internet!
5.0 étoiles sur 5 Easily Learn Pentesting 16 juin 2014
Par murat aydin - Publié sur Amazon.com
Format:Broché
The book is a very nice introduction to pentesting for Android Devices. It is very easy to follow the book and you dont need to open your notebook to follow the book. It covers many aspects of security of apps and devices. Some topics covered are reverse engineering, network traffic analysis, auditing android apps, etc..Both novice and experienced Android developers can read the book. In every chapter, one aspect of android app or device security is discussed. Tools used for security and pentesting are introduced and usage of the tools are shown step by step. I learnt many new information and tools from this book. In the last chapter it has even a template for pentesting report. I recommend this book to people who wants to get introduced to android security and pentesting.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique