Hacking Android

Explore every nook and cranny of the Android OS to modify your device and guard it against security threats
Preview in Mapt

Hacking Android

Srinivasa Rao Kotipalli, Mohammed A. Imran

4 customer reviews
Explore every nook and cranny of the Android OS to modify your device and guard it against security threats
Mapt Subscription
FREE
$29.99/m after trial
eBook
$25.20
RRP $35.99
Save 29%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$25.20
$44.99
$29.99p/m after trial
RRP $35.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Hacking Android Book Cover
Hacking Android
$ 35.99
$ 25.20
Python For Android Hacking Crash Course: Trojan Perspective [Video] Book Cover
Python For Android Hacking Crash Course: Trojan Perspective [Video]
$ 32.99
$ 28.05
Buy 2 for $35.00
Save $33.98
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781785883149
Paperback376 pages

Book Description

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.

Hacking Android is a step-by-step guide that will get you started with Android security. You’ll begin your journey at the absolute basics, and then will slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. On this journey you’ll get to grips with various tools and techniques that can be used in your everyday pentests. You’ll gain the skills necessary to perform Android application vulnerability assessment and penetration testing and will create an Android pentesting lab.

Table of Contents

Chapter 1: Setting Up the Lab
Installing the required tools
Android Studio
Setting up an AVD
Configuring the AVD
ADB Primer
Summary
Chapter 2: Android Rooting
What is rooting?
Locked and unlocked boot loaders
Stock recovery and Custom recovery
Rooting Process and Custom ROM installation
Rooting a Samsung Note 2
Flashing the Custom ROM to the phone
Summary
Chapter 3: Fundamental Building Blocks of Android Apps
Basics of Android apps
Android app components
Building DEX files from the command line
What happens when an app is run?
Understanding app sandboxing
Summary
Chapter 4: Overview of Attacking Android Apps
Introduction to Android apps
Understanding the app's attack surface
Threats at the client side
Threats at the backend
Guidelines for testing and securing mobile apps
Automated tools
Identifying the attack surface
QARK (Quick Android Review Kit)
Summary
Chapter 5: Data Storage and Its Security
What is data storage?
Shared preferences
SQLite databases
Internal storage
External storage
User dictionary cache
Insecure data storage – NoSQL database
Backup techniques
Being safe
Summary
Chapter 6: Server-Side Attacks
Different types of mobile apps and their threat model
Mobile applications server-side attack surface
Strategies for testing mobile backend
Summary
Chapter 7: Client-Side Attacks – Static Analysis Techniques
Attacking application components
Static analysis using QARK:
Summary
Chapter 8: Client-Side Attacks – Dynamic Analysis Techniques
Automated Android app assessments using Drozer
Introduction to Cydia Substrate
Runtime monitoring and analysis using Introspy
Hooking using Xposed framework
Dynamic instrumentation using Frida
Logging based vulnerabilities
WebView attacks
Summary
Chapter 9: Android Malware
What do Android malwares do?
Writing Android malwares
Registering permissions
Malware analysis
Tools for automated analysis
Summary
Chapter 10: Attacks on Android Devices
MitM attacks
Dangers with apps that provide network level access
Using existing exploits
Malware
Bypassing screen locks
Pulling data from the sdcard
Summary

What You Will Learn

  • Acquaint yourself with the fundamental building blocks of Android Apps in the right way
  • Pentest Android apps and perform various attacks in the real world using real case studies
  • Take a look at how your personal data can be stolen by malicious attackers
  • Understand the offensive maneuvers that hackers use
  • Discover how to defend against threats
  • Get to know the basic concepts of Android rooting
  • See how developers make mistakes that allow attackers to steal data from phones
  • Grasp ways to secure your Android apps and devices
  • Find out how remote attacks are possible on Android devices

Authors

Table of Contents

Chapter 1: Setting Up the Lab
Installing the required tools
Android Studio
Setting up an AVD
Configuring the AVD
ADB Primer
Summary
Chapter 2: Android Rooting
What is rooting?
Locked and unlocked boot loaders
Stock recovery and Custom recovery
Rooting Process and Custom ROM installation
Rooting a Samsung Note 2
Flashing the Custom ROM to the phone
Summary
Chapter 3: Fundamental Building Blocks of Android Apps
Basics of Android apps
Android app components
Building DEX files from the command line
What happens when an app is run?
Understanding app sandboxing
Summary
Chapter 4: Overview of Attacking Android Apps
Introduction to Android apps
Understanding the app's attack surface
Threats at the client side
Threats at the backend
Guidelines for testing and securing mobile apps
Automated tools
Identifying the attack surface
QARK (Quick Android Review Kit)
Summary
Chapter 5: Data Storage and Its Security
What is data storage?
Shared preferences
SQLite databases
Internal storage
External storage
User dictionary cache
Insecure data storage – NoSQL database
Backup techniques
Being safe
Summary
Chapter 6: Server-Side Attacks
Different types of mobile apps and their threat model
Mobile applications server-side attack surface
Strategies for testing mobile backend
Summary
Chapter 7: Client-Side Attacks – Static Analysis Techniques
Attacking application components
Static analysis using QARK:
Summary
Chapter 8: Client-Side Attacks – Dynamic Analysis Techniques
Automated Android app assessments using Drozer
Introduction to Cydia Substrate
Runtime monitoring and analysis using Introspy
Hooking using Xposed framework
Dynamic instrumentation using Frida
Logging based vulnerabilities
WebView attacks
Summary
Chapter 9: Android Malware
What do Android malwares do?
Writing Android malwares
Registering permissions
Malware analysis
Tools for automated analysis
Summary
Chapter 10: Attacks on Android Devices
MitM attacks
Dangers with apps that provide network level access
Using existing exploits
Malware
Bypassing screen locks
Pulling data from the sdcard
Summary

Book Details

ISBN 139781785883149
Paperback376 pages
Read More
From 4 reviews

Read More Reviews

Recommended for You

Android Programming for Beginners Book Cover
Android Programming for Beginners
$ 39.99
$ 28.00
Python Machine Learning Book Cover
Python Machine Learning
$ 35.99
$ 25.20
Learning Linux Binary Analysis Book Cover
Learning Linux Binary Analysis
$ 35.99
$ 25.20
Mobile Device Exploitation Cookbook Book Cover
Mobile Device Exploitation Cookbook
$ 31.99
$ 22.40
Kali Linux 2: Windows Penetration Testing Book Cover
Kali Linux 2: Windows Penetration Testing
$ 39.99
$ 28.00
Advanced Tools and Techniques Beyond Base R [Video] Book Cover
Advanced Tools and Techniques Beyond Base R [Video]
$ 124.99
$ 106.25