In this chapter, we learned about different attack vectors in Android, which could be useful from a penetration tester's point of view. This chapter should serve as a quick walkthrough of different attack vectors; however, you are advised to experiment with these attack vectors and try to modify them, and use them in real-life penetration tests.
In the next chapter, we will be moving away from the application layer and we will focus on ARM-based exploitation for the Android platform.