In this chapter, we will learn about the basics of ARM processors and the different types of vulnerabilities that exist in the ARM world. We will even go ahead and exploit these vulnerabilities in order to get a clear picture of the entire scenario. Also, we will look into different Android rooting exploits and their underlying vulnerabilities which were exploited in the exploits. Considering that most of the Android smartphones today run on ARM-based processors, it is vital for a penetration tester to have a good understanding of ARM and the security risks attached with it.
Learning Pentesting for Android Devices
By :
Learning Pentesting for Android Devices
By:
Overview of this book
Table of Contents (18 chapters)
Learning Pentesting for Android Devices
Credits
Foreword
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Android Security
Preparing the Battlefield
Reversing and Auditing Android Apps
Traffic Analysis for Android Devices
Android Forensics
Playing with SQLite
Lesser-known Android Attacks
ARM Exploitation
Writing the Pentest Report
Index
Customer Reviews