` [资料分享]+[size=21.3333339691162px]Android security cookbook 一、看威武霸气的封面 作者:Keith Makan (作者), Scott Alexander-Bown (作者) 二、读读简介,看看适合你吗? Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabili ties in the form of detailed recipes and walkthroughs. "Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from reading this book. 三、看看目录,了解其主要内容 Preface 1Chapter 1: Android Development Tools 7 Introduction 7
Installing the Android Development Tools (ADT) 8
Installing the Java Development Kit (JDK) 12
Updating the API sources 16
Alternative installation of the ADT 17
Installing the Native Development Kit (NDK) 22
Emulating Android 24
Creating Android Virtual Devices (AVDs) 27
Using the Android Debug Bridge (ADB) to interact with the AVDs 29
Copying files off/onto an AVD 30
Installing applications onto the AVDs via ADB 31Chapter 2: Engaging with Application Security 33
Introduction 33
Inspecting application certificates and signatures 34
Signing Android applications 45
Verifying application signatures 48
Inspecting the AndroidManifest.xml file 49
Interacting with the activity manager via ADB 59
Extracting application resources via ADB 63Chapter 3: Android Security Assessment Tools 71
Introduction 71
Installing and setting up Santoku 73
Setting up drozer 79
Running a drozer session 87
Enumerating installed packages 90
Enumerating activities 95
Enumerating content providers 98
Enumerating services 100
Enumerating broadcast receivers 103
Determining application attack surfaces 104
Launching activities 106
Writing a drozer module – a device enumeration module 108
Writing an application certificate enumerator 112Chapter 4: Exploiting Applications 115
Introduction 115
Information disclosure via logcat 118
Inspecting network traffic 123
Passive intent sniffing via the activity manager 129
Attacking services 135
Attacking broadcast receivers 139
Enumerating vulnerable content providers 141
Extracting data from vulnerable content providers 144
Inserting data into content providers 148
Enumerating SQL-injection vulnerable content providers 150
Exploiting debuggable applications 152
Man-in-the-middle attacks on applications 158Chapter 5: Protecting Applications 165
Introduction 165
Securing application components 166
Protecting components with custom permissions 168
Protecting content provider paths 171
Defending against the SQL-injection attack 174
Application signature verification (anti-tamper) 177
Tamper protection by detecting the installer, emulator, and debug flag 181
Removing all log messages with ProGuard 184
Advanced code obfuscation with DexGuard 189Chapter 6: Reverse Engineering Applications 195
Introduction 195
Compiling from Java to DEX 197
Decompiling DEX files 200
Interpreting the Dalvik bytecode 218
Decompiling DEX to Java 227
Decompiling the application's native libraries 231
Debugging the Android processes using the GDB server 232Chapter 7: Secure Networking 237
Introduction 237
Validating self-signed SSL certificates 238
Using StrongTrustManager from the OnionKit library 247
SSL pinning 249Chapter 8: Native Exploitation and Analysis 257
Introduction 257
Inspecting file permissions 258
Cross-compiling native executables 268
Exploitation of race condition vulnerabilities 276
Stack memory corruption exploitation 281
Automated native Android fuzzing 289Chapter 9: Encryption and Developing DeviceAdministration Policies 301
Introduction 301
Using cryptography libraries 302
Generating a symmetric encryption key 304
Securing SharedPreferences data 308
Password-based encryption 310
Encrypting a database with SQLCipher 314
Android KeyStore provider 317
Setting up device administration policies 320Index 329
五、喜欢吗?还在等什么?抓紧下载奥! 360网盘:[size=21.3333339691162px]http://yunpan.cn/cHxIrShrnB6QI 访问密码 d9ac
`
|