In this chapter, we will look inside an Android application, or the .apk
file, and understand its different components. We will also go ahead and reverse the applications using tools, such as Apktool, dex2jar, and jd-gui. We will further learn how to find various vulnerabilities in Android applications by reversing them and analyzing the source code. We will also use some static analysis tools and scripts in order to find vulnerabilities and exploit them.
Learning Pentesting for Android Devices
By :
Learning Pentesting for Android Devices
By:
Overview of this book
Table of Contents (18 chapters)
Learning Pentesting for Android Devices
Credits
Foreword
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Android Security
Preparing the Battlefield
Reversing and Auditing Android Apps
Traffic Analysis for Android Devices
Android Forensics
Playing with SQLite
Lesser-known Android Attacks
ARM Exploitation
Writing the Pentest Report
Index
Customer Reviews