相關主題
商品描述
This book covers the Android operating system and how it can be deployed during a security assessment of an organization. With the majority of mobile devices such as tablets, cell phones and many other devices the Android OS has not only shown its popular but also its versatility. As a common and versatile platform it can be deployed as a very powerful and flexible tool which can be used as part of a penetration test of an organization. Backed up by the fact that the operating system and tools can be installed on a small, mobile device such as a cell phone that can be easily concealed and doesn’t draw undue attention a potent tool can be carried into just about any environment with ease.
This book covers the penetration testing process as well as the tools used when conducted using the Android platform. While penetration testing is covered the book will not stop there as it will also introduce the unique abilities that Android and its tools plus environment bring to the table.
Some of the topics covered in the book will include:
- Linux vs Android vs Customized Android OS for penetration testing. How each differs and what they offer over the others.
- Enhanced Bluetooth hacking using the unique abilities of the Android OS and hardware based solutions such as the Ubertooth One.
- Using Android solutions to map networks and automatically gain reconnaissance on a targeted network
- Building an Android based penetration tester’s toolkit without breaking the bank
- Performing NFC hacking
- Mapping, controlling and dominating WiFi Networks
- Sniffing wired, wireless, and Bluetooth traffic
商品描述(中文翻譯)
這本書涵蓋了 Android 作業系統及其在組織安全評估中的部署方式。隨著大多數行動裝置如平板電腦、手機及其他許多設備的普及,Android 作業系統不僅展現了其受歡迎程度,還顯示了其多功能性。作為一個常見且多用途的平台,它可以作為一個非常強大且靈活的工具,作為組織滲透測試的一部分進行部署。由於作業系統和工具可以安裝在小型行動裝置上,例如手機,這些裝置易於隱藏且不會引起過多注意,因此這是一個可以輕鬆攜帶到幾乎任何環境中的強大工具。
這本書涵蓋了滲透測試過程以及在 Android 平台上進行滲透測試時所使用的工具。雖然書中會討論滲透測試,但不僅限於此,還將介紹 Android 及其工具和環境所帶來的獨特能力。
書中將涵蓋的一些主題包括:
- Linux 與 Android 與自訂 Android 作業系統在滲透測試中的比較。每者的不同之處及其提供的優勢。
- 利用 Android 作業系統的獨特能力和基於硬體的解決方案(如 Ubertooth One)進行增強的藍牙駭客攻擊。
- 使用 Android 解決方案來繪製網路並自動獲取目標網路的偵查資訊。
- 建立一個基於 Android 的滲透測試工具包而不需花費過多。
- 執行 NFC 駭客攻擊。
- 繪製、控制和主導 WiFi 網路。
- 監聽有線、無線及藍牙流量。