日韩精品 中文字幕 动漫,91亚洲午夜一区,在线不卡日本v一区v二区丶,久久九九国产精品自在现拍

注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全安卓黑客手冊(影印版 英文版)

安卓黑客手冊(影印版 英文版)

安卓黑客手冊(影印版 英文版)

定 價(jià):¥82.00

作 者: Srinivasa Rao,Kotipalli Mohammed,A.Imran 著
出版社: 東南大學(xué)出版社
叢編項(xiàng):
標(biāo) 簽: 計(jì)算機(jī)/網(wǎng)絡(luò) 信息安全

ISBN: 9787564173623 出版時(shí)間: 2017-10-01 包裝: 平裝
開本: 16開 頁數(shù): 353 字?jǐn)?shù):  

內(nèi)容簡介

  隨著安卓移動(dòng)手機(jī)數(shù)量在全球范圍內(nèi)的爆炸性增長,移動(dòng)設(shè)備已經(jīng)成為了我們?nèi)粘I钪胁豢扇鄙俚亩糠帧0沧吭O(shè)備的安全性是一個(gè)廣泛的話題,同樣應(yīng)該納入到日常生活中,為了抵御日益猖獗的智能手機(jī)攻擊,從終端用戶到開發(fā)人員和安全專家,所有人都應(yīng)當(dāng)關(guān)注安卓的安全性?!栋沧亢诳褪謨裕ㄓ坝“?英文版)》將一步步帶你學(xué)習(xí)安卓安全。首先是一些*基礎(chǔ)的內(nèi)容,然后逐漸會(huì)接觸到安卓提權(quán)、應(yīng)用程序安全評定、惡意軟件、APK文件感染以及模糊測試這些概念。在這個(gè)過程中,你將學(xué)會(huì)各種可用于日常滲透測試的工具和技術(shù)。你*終會(huì)獲得進(jìn)行安卓應(yīng)用脆弱性評定以及滲透測試所需要的技能,創(chuàng)建出一個(gè)安卓滲透測試實(shí)驗(yàn)室。

作者簡介

  Srinivasa Rao Kotipalli (@sriniOx0 0) is a security researcher from India. He has extensive hands-on experience in performing web application, infrastructure, and mobile security assessments. He worked as a security consultant at Tata Consultancy Services India for two and a half years and later join9d a start-up in Malaysia. He has delivered training sessions on web, infrastructure, and mobile penetrahon testing for organizations across the world, in countries such as India, Malaysia, Brunei, and Vietnam. Through responsible disclosure programs, he has reported vulnerabilities in many top-notch orgaruzations. He holds a bachelor's degree in information technology and is OSCP certified. He blogs at www. androidpentesting . com and www.infosecinstitute.com.Mohammed A.Imran (@secfigo) is an experienced application security engineer and the founder of null Singapore and null Hyderabad. With more than 6 years of experience in product security and consulting, he spends most of his time on penetration testing, vulnerability assessments, and source code reviews of web and mobile applications. He has helped telecom, banking, and software development houses create and maintain secure SDLC programs. He has also created and delivered training on application security and secure coding practices to students, enterprises, and government orgaruzations. He holds a master's degree in computer science and is actively involved in the information security community and organizes meetups regularly.

圖書目錄

Preface
Chapter 1: Setting Up the Lab
installing the required tools
Java
Android Studio
Setting up an AVD
Real device
Apktool
Dex2jar/JD-GUI
Burp Suite
Configuring the AVD
Drozer
Prerequisites
QARK (No support for windows)
Getting ready
Advanced REST Client for Chrome
Droid Explorer
Cydia Substrate and Introspy
SQLite browser
Frida
Setting up Frida server
Setting up frida-client
Vulnerable apps
Kali Linux
ADB Primer
Checking for connected devices
Getting a shell
Listing the packages
Pushing files to the device
Pulling files from the device
Installing apps using adb
Troubleshooting adb connections
Summary
Chapter 2: Android Rooting
What is rooting?
Why would we root a device?
Advantages of rooting
Unlimited control over the device
Installing additional apps
More features and customization
Disadvantages of rooting
It compromises the security of your device
Bricking your device
Voids warranty
Locked and unlocked boot loaders
Determining boot loader unlock status on Sony devices
Unlocking boot loader on Sony through a vendor specified method
Rooting unlocked boot loaders on a Samsung device
Stock recovery and Custom recovery
Prerequisites
Rooting Process and Custom ROM installation
Installing recovery softwares
Using Odin
Using Heimdall
Rooting a Samsung Note 2
Flashing the Custom ROM to the phone
Summary
Chapter 3: Fundamental Building Blocks of Android Apps
Basics of Android apps
Android app structure
How to get an APK file?
Storage location of APK files
/data/app/
/system/app/
/data/app-private/
Android app components
Activities
……
Chapter 4: Overview of Attacking Android Apps
Chapter 5: Data Storage and Its Security
Chapter 6: Sewer-Side Attacks
Chapter 7: Client-Side Attacks - Static Analysis Techniques
Chapter 8: Client-Side Attacks - Dynamic Analysis Techniques
Chapter 9: Android Malware
Chapter 10: Attacks on Android Devices
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) rgspecialties.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號