Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
HACKING EXPOSED™: MOBILE SECURITY SECRETS & SOLUTIONS Copyright Page Dedication About the Authors At A Glance Contents Foreword Acknowledgments Introduction 1 The Mobile Risk Ecosystem
The Mobile Ecosystem
Scale Perceived Insecurity
The Mobile Risk Model
Physical Risks Service Risks App Risks
Our Agenda Summary
2 Hacking the Cellular Network
Basic Cellular Network Functionality
Interoperability Voice Calls The Control Channels Voice Mailboxes Short Message Service
Attacks and Countermeasures The Brave New World of IP Summary
3 iOS
Know Your iPhone How Secure Is iOS? Jailbreaking: Unleash the Fury!
Boot-based Jailbreak
Hacking Other iPhones: Fury, Unleashed! Summary
4 Android
Security Model Application Components Data Storage Near Field Communication (NFC) Android Development
Android Emulator Android Debug Bridge
Rooting Decompiling and Disassembly
Decompiling
Intercepting Network Traffic
Adding Trusted CA Certificates Configuring a Proxy Server
Intent-Based Attacks NFC-Based Attacks Information Leakage
Leakage via Internal Files Leakage via External Storage Information Leakage via Logs Information Leakage via Insecure Components General Mitigation Strategies to Prevent Information Leakage
Summary
5 Mobile Malware
Android Malware iOS Malware Malware Security: Android vs. iOS Summary
6 Mobile Services and Mobile Web
General Web Service Security Guidelines Attacks Against XML-based Web Services Common Authentication and Authorization Frameworks
OAuth 2 SAML
Mobile Web Browser and WebView Security
Exploiting Custom URI Schemes Exploiting JavaScript Bridges
Summary
7 Mobile Device Management
MDM Frameworks Device Provisioning Bypassing MDM Decompiling and Debugging Apps Detecting Jailbreaks Remote Wipe and Lock Summary
8 Mobile Development Security
Mobile App Threat Modeling
Threats Assets Finishing and Using the Threat Model
Secure Mobile Development Guidance
Preparation Secure Mobile Application Guidelines Testing to Make Sure For Further Reading
Summary
9 Mobile Payments
Current Generation Contactless Smartcard Payments
Secure Element Secure Element API Mobile Application
Google Wallet Square Summary
A Consumer Security Checklist
Security Checklist
B Mobile Application Penetration Testing Toolkit
iOS Pen Test Toolkit Android Pen Test Toolkit
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion