The Mobile Application Hacker’s Handbook

Editorial Reviews

See your app through a hacker’s eyes to find the real sources of vulnerability

The Mobile Application Hacker’s Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker’s point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. * Understand the ways data can be stored, and how cryptography is defeated * Set up an environment for identifying insecurities and the data leakages that arise * Develop extensions to bypass security controls and perform injection attacks * Learn the different attacks that apply specifically to cross-platform apps

IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker’s trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker’s Handbook is a practical, comprehensive guide.

Table of Contents

Chapter 1 Mobile Application (In)security
Chapter 2 Analyzing iOS Applications
Chapter 3 Attacking iOS Applications
Chapter 4 Identifying iOS Implementation Insecurities
Chapter 5 Writing Secure iOS Applications
Chapter 6 Analyzing Android Applications
Chapter 7 Attacking Android Applications
Chapter 8 Identifying and Exploiting Android Implementation Issues
Chapter 9 Writing Secure Android Applications
Chapter 10 Analyzing Windows Phone Applications
Chapter 11 Attacking Windows Phone Applications
Chapter 12 Identifying Windows Phone Implementation Issues
Chapter 13 Writing Secure Windows Phone Applications
Chapter 14 Analyzing BlackBerry Applications
Chapter 15 Attacking BlackBerry Applications
Chapter 16 Identifying BlackBerry Application Issues
Chapter 17 Writing Secure BlackBerry Applications
Chapter 18 Cross-Platform Mobile Applications

Book Details

Book Preview

Click to Look Inside This eBook: Browse Sample Pages

PDF eBook Free Download

Note: There is a file embedded within this post, please visit this post to download the file.

The post The Mobile Application Hacker’s Handbook appeared first on Fox eBook.

Read Source: The Mobile Application Hacker’s Handbook»

Leave a Reply

Your email address will not be published.