View your app through a hacker's eyes
IT security breaches make headlines almost daily. With both personal and corporate information being carried in so many pockets, mobile applications on the iOS, Android, Blackberry, and Windows Phones are a fertile field for hackers. To discover the true vulnerabilities in a mobile app, you must look at it as a hacker does.
This practical guide focuses relentlessly on the hacker's approach, helping you secure mobile apps by demonstrating how hackers exploit weak points and flaws to gain access to data. Discover a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt, and remediate the various types of attacks.
- Understand the ways data can be stored and how hackers can defeat cryptography
- Set up an environment in which insecurities and data leakages can be identified
- Develop extensions to bypass security controls and perform injection attacks for testing
- Identify the different types of attacks that apply specifically to cross-platform apps
- Recognize how hackers bypass security controls such as jailbreak/root detection, tamper detection, runtime protection, and anti-debugging
- Implement a generic methodology for mobile application testing
Keywords: The Mobile Application Hacker's Handbook, Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse, IT security, mobile security, data security, anti-hacker defense, app security, mobile app testing, mobile app weak points, data leakage, data storage, injection attacks, cross-platform app security, app testing methodology, transport layer protection, hacking iOS, hacking Android, hacking Blackberry, hacking Windows Mobile, hacking techniques, Networking / Security