In this chapter, we will look into the network traffic of Android devices and analyze the traffic data of the platform and applications. Often applications leak sensitive information in their network data, so finding it is one of the most crucial tasks of a penetration tester. Also, you will often encounter applications that perform authentication and session management over insecure network protocols. So, in this chapter, we will learn the ways to intercept and analyze traffic of various applications in an Android device.
Learning Pentesting for Android Devices
By :
Learning Pentesting for Android Devices
By:
Overview of this book
Table of Contents (18 chapters)
Learning Pentesting for Android Devices
Credits
Foreword
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Android Security
Preparing the Battlefield
Reversing and Auditing Android Apps
Traffic Analysis for Android Devices
Android Forensics
Playing with SQLite
Lesser-known Android Attacks
ARM Exploitation
Writing the Pentest Report
Index
Customer Reviews