Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Популярные книги


Mobile Device Exploitation Cookbook
Название : Mobile Device Exploitation Cookbook
Автор : Akshay Dixit, Prashant Verma
Издательство: Packt Publishing
Год издания : 2016
ISBN : 978-1-78355-872-8
Страниц: 320
Формат : PDF
Размер файла: 17,5 Mб
Язык : English

Mobile attacks are on the rise. We are adapting ourselves to new and improved smartphones, gadgets, and their accessories, and with this network of smart things, come bigger risks. Threat exposure increases and the possibility of data losses increase. Exploitations of mobile devices are significant sources of such attacks. Mobile devices come with different platforms, such as Android and iOS. Each platform has its own feature-set, programming language, and a different set of tools. This means that each platform has different exploitation tricks, different malware, and requires a unique approach in regards to forensics or penetration testing. Device exploitation is a broad subject which is widely discussed, equally explored by both Whitehats and Blackhats. This cookbook recipes take you through a wide variety of exploitation techniques across popular mobile platforms. The journey starts with an introduction to basic exploits on mobile platforms and reverse engineering for Android and iOS platforms. Setup and use Android and iOS SDKs and the Pentesting environment. Understand more about basic malware attacks and learn how the malware are coded. Further, perform security testing of Android and iOS applications and audit mobile applications via static and dynamic analysis. Moving further, you’ll get introduced to mobile device forensics. Attack mobile application traffic and overcome SSL, before moving on to penetration testing and exploitation. The book concludes with the basics of platforms and exploit tricks on BlackBerry and Windows Phone. By the end of the book, you will be able to use variety of exploitation techniques across popular mobile platforms with stress on Android and iOS. What You Will Learn
• Install and configure Android SDK and ADB
• Analyze Android Permission Model using ADB and bypass Android Lock Screen Protection
• Set up the iOS Development Environment – Xcode and iOS Simulator
• Create a Simple Android app and iOS app and run it in Emulator and Simulator respectively
• Set up the Android and iOS Pentesting Environment
• Explore mobile malware, reverse engineering, and code your own malware
• Audit Android and iOS apps using static and dynamic analysis
• Examine iOS App Data storage and Keychain security vulnerabilities
• Set up the Wireless Pentesting Lab for Mobile Devices
• Configure traffic interception with Android and intercept Traffic using Burp Suite and Wireshark
• Attack mobile applications by playing around with traffic and SSL certificates
• Set up the Blackberry and Windows Phone Development Environment and Simulator
• Setting up the Blackberry and Windows Phone Pentesting Environment
• Steal data from Blackberry and Windows phones applications








Нерабочая ссылка? Вам СЮДА


Успейте скачать!!!
Ссылки на скачивание книг ЗАПРЕЩЕННЫХ ИЗДАТЕЛЬСТВ удаляются через 3 дня с момента публикации и заменяются (по договору с АЗАПИ) партнерскими ссылками магазина LITRES!



Автор: vitvikvas 6-08-2016, 09:07 | Напечатать |
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.




С этой публикацией часто скачивают:

    Mobile Security and Privacy Mobile Security and Privacy Название: Mobile Security and Privacy Автор: Man Ho Au and Raymond Choo Издательство: Syngress Год: 2016 Формат: PDF Размер: 13 Мб Язык: английский...

    5G Mobile Communications 5G Mobile Communications Название: 5G Mobile Communications Автор: Wei Xiang and Kan Zheng Издательство: Springer Год: 2016 Формат: PDF Размер: 15,9 Мб Язык: английский /...

    Seven Mobile Apps in Seven Weeks: Native Apps, Multiple Platforms Seven Mobile Apps in Seven Weeks: Native Apps, Multiple Platforms Название: Seven Mobile Apps in Seven Weeks: Native Apps, Multiple Platforms Автор: Tony Hillerson Издательство: Pragmatic Bookshelf Год: 2016...

    Beginning Android Programming with Android Studio, 4th Edition Beginning Android Programming with Android Studio, 4th Edition Название: Beginning Android Programming with Android Studio, 4th Edition Автор: Jerome F. DiMarzio Издательство: Wrox Год: 2016 Страниц: 456 Формат:...

    The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy Название: The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy Автор: John Sammons and Michael Cross Издательство: Syngress Год:...

    Hacking Android (+code) Hacking Android (+code) Название: Hacking Android Автор: Srinivasa Rao Kotipalli, Mohammed A. Imran Издательство: Packt Publishing Год: 2016 Страниц: 376 Формат: PDF Размер:...

    Android 5 Programming by Example Android 5 Programming by Example Название: Android 5 Programming by Example Автор: Kyle Mew Издательство: Packt Publishing Год: 2015 Страниц: 222 Формат: PDF Размер: 11 Mb Язык:...

    Learning iOS Forensics Learning iOS Forensics Название: Learning iOS Forensics Автор: Mattia Epifani Издательство: Packt Publishing Год: 2015 Формат: PDF, EPUB, MOBİ Размер: 15,3 Мб Язык:...

    Mobile Security: How to Secure, Privatize, and Recover Your Devices Mobile Security: How to Secure, Privatize, and Recover Your Devices Название: Mobile Security: How to Secure, Privatize, and Recover Your Devices Автор: Timothy Speed, Darla Nykamp Издательство: Packt Publishing Год:...

    Game Programming Using QT Game Programming Using QT Название: Game Programming Using QT Автор: Witold Wysota, Lorenz Haas Издательство: Packt Publishing Год: 2016 Формат: PDF, EPUB Размер: 17,7 Мб ...

    Citrix XenDesktop Cookbook Citrix XenDesktop Cookbook Название: Citrix XenDesktop Cookbook Автор: Gaspare A. Silvestri Издательство: Packt Publishing Год: 2015 Формат: PDF Размер: 12,2 Мб Язык:...

    Network Attacks and Exploitation: A Framework Network Attacks and Exploitation: A Framework Название: Network Attacks and Exploitation: A Framework Автор: Matthew Monte Издательство: John Wiley & Sons Год: 2015 Формат: PDF Размер: 26,4 Мб ...

  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent





Нажимая на кнопку "Отправить", Вы даете согласие на обработку персональных данных, а также подтверждаете условия "Политики конфиденциальности" настоящего сайта.


 MirKnig.Su  ©2017     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности