Learning Pentesting for Android Devices (2014)
Chapter 1. Getting Started with Android Security
Chapter 2. Preparing the Battlefield
Chapter 3. Reversing and Auditing Android Apps
Chapter 4. Traffic Analysis for Android Devices
Chapter 6. Playing with SQLite
Chapter 7. Lesser-known Android Attacks
Chapter 9. Writing the Pentest Report
Security Audit of Attify's Vulnerable App
All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)
If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.
© 2016-2026 All site design rights belong to S.Y.A.