Android Hacker's Handbook

By: Joshua J. Drake, Wiley Publication

The Android Hacker’s Handbook team members chose to write this book because the field of mobile security research is so “sparsely charted” with disparate and conflicted information (in the form of resources and techniques).

There have been some fantastic papers and published resources that feature Android, but much of what has been written is either very narrow (focusing on a specific facet of Android security) or mentions Android only as an ancillary detail of a security issue regarding a specific mobile technology or embedded device. Further, public vulnerability information surrounding Android is scarce. Despite the fact that 1,000 or more publicly disclosed vulnerabilities affect Android devices, multiple popular sources of vulnerability information report fewer than 100.

The team believes that the path to improving Android’s security posture starts by understanding the technologies, concepts, tools, techniques, and issues in this book
.

    [CLICK HERE TO DOWNLOAD]
    
    Table of Contents
  • Introduction
  • Chapter 1 Looking at the Ecosystem                               
  • Chapter 2 Android Security Design and Architecture         
  • Chapter 3 Rooting Your Device                                  
  • Chapter 4 Reviewing Application Security 
  • Chapter 5 Understanding Android’s Attack Surface 
  • Chapter 6 Finding Vulnerabilities with Fuzz Testing
  • Chapter 7 Debugging and Analyzing Vulnerabilities
  • Chapter 8 Exploiting User Space Software
  • Chapter 9 Return Oriented Programming
  • Chapter 10 Hacking and Attacking the Kernel 
  • Chapter 11 Attacking the Radio Interface Layer 
  • Chapter 12 Exploit Mitigations 
  • Chapter 13 Hardware Attacks 
  • Appendix A Tool Catalog 
  • Appendix B Open Source Repositories 
  • Appendix C References 
  • Index 

      "Click on the link below to keep this site running - your support is highly appreciated."
     💙 An add will be displayed, it will help us to keep this website free.






Comments