Srinivasa Rao Kotipalli (@sriniOx0 0) is a security researcher from India. He has extensive hands-on experience in performing web application, infrastructure, and mobile security assessments. He worked as a security consultant at Tata null
无
Preface Chapter 1: Setting Up the Lab installing the required tools Java Android Studio Setting up an AVD Real device Apktool Dex2jar/JD-GUI Burp Suite Configuring the AVD Drozer Prerequisites QARK (No support for windows) Getting ready Advanced REST Client for Chrome Droid Explorer Cydia Substrate and Introspy SQLite browser Frida Setting up Frida server Setting up frida-client Vulnerable apps Kali Linux ADB Primer Checking for connected devices Getting a shell Listing the packages Pushing files to the device Pulling files from the device Installing apps using adb Troubleshooting adb connections Summary Chapter 2: Android Rooting What is rooting? Why would we root a device? Advantages of rooting Unlimited control over the device Installing additional apps More features and customization Disadvantages of rooting It compromises the security of your device Bricking your device Voids warranty Locked and unlocked boot loaders Determining boot loader unlock status on Sony devices Unlocking boot loader on Sony through a vendor specified method Rooting unlocked boot loaders on a Samsung device Stock recovery and Custom recovery Prerequisites Rooting Process and Custom ROM installation Installing recovery softwares Using Odin Using Heimdall Rooting a Samsung Note 2 Flashing the Custom ROM to the phone Summary Chapter 3: Fundamental Building Blocks of Android Apps Basics of Android apps Android app structure How to get an APK file? Storage location of APK files /data/app/ /system/app/ /data/app-private/ Android app components Activities …… Chapter 4: Overview of Attacking Android Apps Chapter 5: Data Storage and Its Security Chapter 6: Sewer-Side Attacks Chapter 7: Client-Side Attacks - Static Analysis Techniques Chapter 8: Client-Side Attacks - Dynamic Analysis Techniques Chapter 9: Android Malware Chapter 10: Attacks on Android Devices Index