Learning Pentesting for Android Devices (2014)

Learning Pentesting for Android Devices (2014)

Foreword

Preface

Chapter 1. Getting Started with Android Security

Chapter 2. Preparing the Battlefield

Chapter 3. Reversing and Auditing Android Apps

Chapter 4. Traffic Analysis for Android Devices

Chapter 5. Android Forensics

Chapter 6. Playing with SQLite

Chapter 7. Lesser-known Android Attacks

Chapter 8. ARM Exploitation

Chapter 9. Writing the Pentest Report

Security Audit of Attify's Vulnerable App