Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
1/5
()
About this ebook
In order to protect and defend mobile application and device deployments, you need to be able to effectively evaluate the security of mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test. And if you work with Android or iOS devices as part of your day-to-day work, this popular pocket guid
James Stevenson
James Stevenson is an op-ed contributor to the New York Times. His popular column, "Lost and Found New York," has appeared regularly in the newspaper since 2003. He was on the staff of The New Yorker for more than three decades; his work includes 2,000 cartoons and 80 covers, as well as reporting and fiction. He is also the author and illustrator of over 100 children's books. He lives in Connecticut.
Read more from James Stevenson
The Mud Flat Mystery Rating: 3 out of 5 stars3/5New Eusebius, A: Documents Illustrating the History of the Church to A.D.337 Rating: 4 out of 5 stars4/5The Unprotected Witness Rating: 0 out of 5 stars0 ratingsThe Bones in the Cliff Rating: 0 out of 5 stars0 ratingsCeremonial of Hasjelti Dailjis and Mythical Sand Painting of the Navajo Indians Rating: 0 out of 5 stars0 ratingsThe Iron Relic Book I: The Crossing Rating: 0 out of 5 stars0 ratingsIllustrated Catalogue of the Collections Obtained from the Pueblos of Zuñi, New Mexico, and Wolpi, Arizona, in 1881 Third Annual Report of the Bureau of Ethnology to the Secretary of the Smithsonian Institution, 1881-82, Government Printing Office, Washington, 1884, pages 511-594 Rating: 0 out of 5 stars0 ratings
Related to Mobile Offensive Security Pocket Guide
Related ebooks
History Of Google Android Rating: 0 out of 5 stars0 ratingsAndroid Application Security Essentials Rating: 0 out of 5 stars0 ratingsLearning Android Forensics Rating: 4 out of 5 stars4/5Hacking Android Rating: 5 out of 5 stars5/5Practical Mobile Forensics Rating: 4 out of 5 stars4/5Android Hacker's Handbook Rating: 4 out of 5 stars4/5Mastering Mobile Forensics Rating: 5 out of 5 stars5/5Software Knowledge Rating: 0 out of 5 stars0 ratingsNetwork Attacks and Exploitation: A Framework Rating: 4 out of 5 stars4/5Android Security Cookbook Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratings#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsLearning iOS Security Rating: 0 out of 5 stars0 ratingsMobile Computing: Securing your workforce Rating: 0 out of 5 stars0 ratingsPenetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Framework (English Edition) Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsKali Linux Network Scanning Cookbook Rating: 0 out of 5 stars0 ratingsOverview of Some Windows and Linux Intrusion Detection Tools Rating: 0 out of 5 stars0 ratingsKali Linux Intrusion and Exploitation Cookbook Rating: 5 out of 5 stars5/5Asynchronous Android Rating: 4 out of 5 stars4/5Kali Linux Cookbook Rating: 4 out of 5 stars4/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5Kali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Zero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsLearn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsWireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsDeep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsCompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCodes and Ciphers Rating: 5 out of 5 stars5/5Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratingsOSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence Rating: 0 out of 5 stars0 ratingsCodes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5
Reviews for Mobile Offensive Security Pocket Guide
1 rating0 reviews
Book preview
Mobile Offensive Security Pocket Guide - James Stevenson
MOBILE OFFENSIVE SECURITY POCKET GUIDE -
A QUICK REFERENCE GUIDE FOR ANDROID AND IOS
James Stevenson
UK
ISBN-13 (pbk): 978-1-3999-2195-4
ISBN-13 (electronic): 978-1-3999-2196-1
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.
The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
Author: James Stevenson | www.jamesstevenson.me
Editor: Nic Carter | www.fiverr.com/thisisstrange
Formatting: Formatted Books | www.formattedbooks.com
For information on translations, reprint, paperback, or audio rights, please communicate with the author directly, at www.jamesstevenson.me.
CONTENTS
About the Author
Chapter 1: Introduction
Chapter 2: Reverse Engineering Fundamentals
Chapter 3: Mobile Application Reverse Engineering
Chapter 4: Dynamic Instrumentation of Mobile Applications with Frida
Chapter 5: Operating System Internals
Chapter 6: Baseband
Chapter 7: Putting It To The Test
Chapter 8: Closing Thoughts
Table of Figures
Index
ABOUT THE AUTHOR
James Stevenson has been working in the programming and computer security industry for over 5 years. Most of that has been working as an Android software engineer and vulnerability researcher. Before this, James graduated with a BSc in computer security in 2017. James has previously published the book Android Software Internals Quick Reference, with Apress publishing in 2021.
At the time of writing, James is a full-time security researcher, part-time Ph.D. student, and occasional conference speaker. Outside of Android internals, James’ research has also focused on offender profiling and cybercrime detection capabilities.
For more information and contact details, visit https://JamesStevenson.me.
CHAPTER ONE
INTRODUCTION
Mobile Offensive Security comes in many flavors—from application security and operating system internals to the vulnerability research of the baseband and other processors. This book attempts to summarize all of these unique areas of mobile offensive security into a handy and easy-to-use pocket guide.
While this pocket guide is not exhaustive in all things mobile offensive security, it sets the groundwork for how and where you can go to further your knowledge in specific areas.
Towards the end of this book, you will also find a series of challenges that summarize the key areas of many of the book’s chapters if you are looking to put your knowledge to the test.
What This Book Is
An introduction to the concepts of Reverse Engineering, Mobile Offensive Security, and other Mobile Security systems such as Baseband.
An easy-to-digest pocket guide detailing fundamental knowledge, principles, and methods related to mobile offensive security.
A reference guide for reverse engineering principles and approaches.
A guide for offensive security engagements, including Frida and dynamic instrumentation references.
An introduction to baseband and a methodology to follow when it comes to reverse engineering baseband implementations.
A summary guide for iOS and Android architectures and security assessment methodologies.
A collection of challenges, useful for putting the knowledge to the test.
What This Book Is Not
A list of zero-days or exploits for mobile devices or modern baseband implementations.
A completely exhaustive list of exploits, approaches, or techniques—this is a pocket guide.
Tools Used Throughout The Book
IDA Pro – https://hex-rays.com/ida-pro/
Ghidra – https://ghidra-sre.org/
GDB – https://www.gnu.org/software/gdb/
Jadx – https://github.com/skylot/jadx
APK Tool – https://ibotpeaches.github.io/Apktool/
Frida – https://frida.re/
Frida iOS Dump – https://github.com/AloneMonkey/frida-ios-dump
FriDump – https://github.com/Nightbringer21/fridump
Objection – https://github.com/sensepost/objection
Android Debug Bridge (ADB) – https://developer.android.com/studio/command-line/adb
dex2jar – https://sourceforge.net/projects/dex2jar/
JD GUI – http://java-decompiler.github.io/
AFL++ – https://github.com/AFLplusplus/AFLplusplus
Checkra1n – https://checkra.in/
Quark – https://github.com/quark-engine/quark-engine
Drozer – https://labs.f-secure.com/tools/drozer/
CHAPTER TWO
REVERSE ENGINEERING FUNDAMENTALS
The first chapter of this book goes through fundamental reverse engineering principles and techniques used throughout this book. For the purpose of this book, we will be using the Merriam Webster definition of reverse engineering in the context of product and application security, this being:
To disassemble and examine or analyse