Mobile Device Exploitation Cookbook(Paperback)

Prashant Verma, Akshay Dixit

  • 出版商: Packt Publishing
  • 出版日期: 2016-06-30
  • 售價: $1,810
  • 貴賓價: 9.5$1,720
  • 語言: 英文
  • 頁數: 320
  • 裝訂: Paperback
  • ISBN: 1783558725
  • ISBN-13: 9781783558728
  • 海外代購書籍(需單獨結帳)

相關主題

商品描述

Over 75 recipes to master mobile device penetration testing with open source tools

About This Book

  • Learn device and application exploitation for popular mobile platforms
  • Improve the current security architecture design for mobile systems
  • Discover tricks of the trade with the help of code snippets and screenshots

Who This Book Is For

This book is intended for mobile security enthusiasts and penetration testers who wish to secure mobile devices to prevent attacks and discover vulnerabilities to protect devices.

What You Will Learn

  • Introduction to Android and iOS security and rooting
  • Explore mobile malwares, reverse engineering, and code your own malware
  • Audit mobile applications via static and dynamic analysis
  • Create custom RAMs and disk images and learn about mobile forensics
  • Attack mobile applications by playing around with traffic and SSL certificates
  • Employ ARM exploits such as buffer overflow, R2ZP, ROP, and other kernel attacks
  • Set up an exploitation lab
  • Set up a BlackBerry and Windows Phone development environment and simulator
  • Configure traffic interception settings for Windows and BlackBerry phones

In Detail

Mobile attacks are on the rise. We are adapting ourselves to new and improved smartphones, gadgets, and their accessories, and with this network of smart things, come bigger risks. Threat exposure increases and the possibility of data losses increase. Exploitations of mobile devices are significant sources of such attacks.

Mobile devices come with different platforms, such as Android and iOS. Each platform has its own feature-set, programming language, and a different set of tools. This means that each platform has different exploitation tricks, different malware, and requires a unique approach in regards to forensics or penetration testing. Device exploitation is a broad subject which is widely discussed, equally explored by both Whitehats and Blackhats.

This book takes you through a wide variety of exploitation techniques across popular mobile platforms. The journey starts with an introduction to basic exploits on mobile platforms, malware analysis, and reverse engineering for Android and iOS platforms. You'll learn more about mobile devices, static and dynamic analysis, and other attacks.

You'll explore mobile device forensics and see how you can create custom RAMs and disk images. You'll learn how to attack mobile application traffic and SSL, before moving on to penetration testing and ARM exploitation.

The book covers the use of debuggers, custom fuzzers, and other similar tools, before you discover how to conduct buffer overflows and Kernel attacks, and also how to write shell codes. Finally, you'll go through basic exploit tricks on BlackBerry and Windows platforms.

商品描述(中文翻譯)

**超過 75 種食譜,掌握使用開源工具進行行動裝置滲透測試**

**關於本書**

- 學習針對流行行動平台的裝置和應用程式利用
- 改進行動系統的當前安全架構設計
- 透過程式碼片段和螢幕截圖發現行業技巧

**本書適合誰**

本書適合行動安全愛好者和滲透測試人員,旨在保護行動裝置以防止攻擊並發現漏洞以保護裝置。

**您將學到什麼**

- Android 和 iOS 安全性及 Rooting 的介紹
- 探索行動惡意軟體、逆向工程,並編寫自己的惡意軟體
- 通過靜態和動態分析審計行動應用程式
- 創建自訂的 RAM 和磁碟映像,並了解行動取證
- 通過操控流量和 SSL 憑證攻擊行動應用程式
- 使用 ARM 漏洞,如緩衝區溢位、R2ZP、ROP 和其他核心攻擊
- 設置利用實驗室
- 設置 BlackBerry 和 Windows Phone 開發環境及模擬器
- 配置 Windows 和 BlackBerry 手機的流量攔截設置

**詳細內容**

行動攻擊正在上升。我們正在適應新的和改進的智慧型手機、裝置及其配件,隨著這個智慧事物的網絡,風險也隨之增加。威脅暴露增加,數據損失的可能性也增加。行動裝置的利用是這類攻擊的重要來源。

行動裝置有不同的平台,如 Android 和 iOS。每個平台都有其獨特的功能集、程式語言和不同的工具集。這意味著每個平台都有不同的利用技巧、不同的惡意軟體,並且在取證或滲透測試方面需要獨特的方法。裝置利用是一個廣泛的主題,受到白帽子和黑帽子同樣的關注。

本書帶您了解流行行動平台上的各種利用技術。旅程從介紹行動平台上的基本利用、惡意軟體分析和 Android 及 iOS 平台的逆向工程開始。您將深入了解行動裝置、靜態和動態分析及其他攻擊。

您將探索行動裝置取證,並了解如何創建自訂的 RAM 和磁碟映像。您將學習如何攻擊行動應用程式的流量和 SSL,然後再進入滲透測試和 ARM 利用。

本書涵蓋了調試器、自訂模糊測試工具和其他類似工具的使用,然後您將學習如何進行緩衝區溢位和核心攻擊,以及如何編寫 shell 代碼。最後,您將了解在 BlackBerry 和 Windows 平台上的基本利用技巧。