Learning Pentesting for Android Devices (2014)

Learning Pentesting for Android Devices (2014)

Foreword

Preface

Chapter 1. Getting Started with Android Security

Chapter 2. Preparing the Battlefield

Chapter 3. Reversing and Auditing Android Apps

Chapter 4. Traffic Analysis for Android Devices

Chapter 5. Android Forensics

Chapter 6. Playing with SQLite

Chapter 7. Lesser-known Android Attacks

Chapter 8. ARM Exploitation

Chapter 9. Writing the Pentest Report

Security Audit of Attify's Vulnerable App



All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)

If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.

© 2016-2026 All site design rights belong to S.Y.A.