Chell, Dominic

The Mobile Application Hacker's Handbook

Chell, Dominic - The Mobile Application Hacker's Handbook, ebook


Ebook, ePUB with Adobe DRM
ISBN: 9781118958513
DRM Restrictions

Printing245 pages with an additional page accrued every 3 hours, capped at 245 pages
Copy to clipboard5 excerpts

View your app through a hacker's eyes

IT security breaches make headlines almost daily. With both personal and corporate information being carried in so many pockets, mobile applications on the iOS, Android, Blackberry, and Windows Phones are a fertile field for hackers. To discover the true vulnerabilities in a mobile app, you must look at it as a hacker does.

This practical guide focuses relentlessly on the hacker's approach, helping you secure mobile apps by demonstrating how hackers exploit weak points and flaws to gain access to data. Discover a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt, and remediate the various types of attacks.

Learn to:

  • Understand the ways data can be stored and how hackers can defeat cryptography
  • Set up an environment in which insecurities and data leakages can be identified
  • Develop extensions to bypass security controls and perform injection attacks for testing
  • Identify the different types of attacks that apply specifically to cross-platform apps
  • Recognize how hackers bypass security controls such as jailbreak/root detection, tamper detection, runtime protection, and anti-debugging
  • Implement a generic methodology for mobile application testing

Keywords: The Mobile Application Hacker's Handbook, Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse, IT security, mobile security, data security, anti-hacker defense, app security, mobile app testing, mobile app weak points, data leakage, data storage, injection attacks, cross-platform app security, app testing methodology, transport layer protection, hacking iOS, hacking Android, hacking Blackberry, hacking Windows Mobile, hacking techniques, Networking / Security

John Wiley and Sons, Inc.
Publication year
Page amount
912 pages
Information Technology, Telecommunications
Printed ISBN

Similar titles