实例介绍
Android.Hackers.Handbook Android 开发好资料
Android hacker's Hand book ffirsindd0150:14PM02/28/2014 ffirs indd 01: 50: 14: PM 02/ 28/2014 Page ii Android hackers Handbook Joshua Drake Pau oliva fora Zach lanier Collin mulliner Stephen A. ridley y Georg wicherski WILEY ffirs indd 01: 50: 14: PM 02/28/2014 Page iii Handbook Published by nt boulevard Ind C ght o 2014 by john wiley s ISBN:978-1-118-608647 ISBN:978-1-118-60861-6(ebk) ISBN:978-1-118-92225-5(ebk) ed in the United States of al 10987654321 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or autho rization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978 )750-8400, fax(978)646-8600 Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley Sons, Inc, 111 River Street, Hoboken, NJ 07030,(201)748-6011, fax(201) 748-6008, or online at Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with espect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold w ith the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disap peared between when this work was written and when it is read For general information on our other products and services please contact our Customer Care Department within the United States at(877)762-2974, outside the United States at( 317)572-3993 or fax(317)572-4002 Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or dvd that is not included in the version you purchased, you may download this material at For more information about Wiley products, visit Library of Congress Control Number: 2013958298 Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley &z Sons, Inc and/or its affiliates, in the United States and other countries, and may not be used without written permission. Android is a trademark of Google, Inc. All other trademarks are the property of their respective owners. John Wiley Sons, Inc is not associated with any product or vendor mentioned in this book ffirs indd 01: 50: 14: PM 02/ 28/2014 Page iv About the authors Joshua J. Drake is a Director of Research Science at Accuvant LABS Joshua focuses on original research in areas such as reverse engineering and the analy- sis, discovery, and exploitation of security vulnerabilities. He has over 10 years of experience in the information security field including researching linux security since 1994, researching Android security since 2009, and consulting with major Android OEMs since 2012. In prior roles, he served at Metasploit and VeriSign s iDefense Labs At BlackHat USA 2012, Georg and Joshua do strated successfully exploiting the Android 4.0.1 browser via NFC. Joshua spoke REcon, CanSecWest, RSA, R /Breakpoint, Toorcon, and derby Con he won pwn2Own in 2013 and won the DefCon 18 CTF with the aCme Pharm team in 2010 Pau oliva Fora is a Mobile security Engineer with via Forensics. He has pre viously worked as R+D Engineer in a wireless provider. He has been actively researching security aspects on the android operating system since its debut with the T-Mobile G1 on October 2008. His passion for smartphone security has manifested itself not just in the numerous exploits and tools he has authored but in other ways, such as serving as a moderator for the very popular Xda Developers forum even before android existed. In his work, he has provided consultation to major Android oEMs. His close involvement with and observa- tion of the mobile security communities has him particularly excited to be a part of pulling together a book of this nature Zach Lanier is a Senior Security researcher at duo Security. Zach has been involved in various areas of information security for over 10 years. He has been conducting mobile and embedded security research since 2009, ffirs indd 01: 50: 14: PM 02/28/2014 Page v About the authors ranging from app security, to platform security (especially Android), to device, network, and carrier security. His areas of research interest include both offensive and defensive techniques as well as privacy-en hancing technologies He has presented at various public and private industry conferences, such as BlackHat, DEFCON, ShmooCon, RSA, Intel Security Conference, Amazon Zon Con, and more Collin Mulliner is a postdoctoral researcher at Northeastern University. His main interest lies in security and privacy of mobile and embedded systems with an emphasis on mobile and smartphones his early work dates back to 1997, when he developed applications for Palm OS. Collin is known for his work on the (in) security of the Multimedia Messaging Service(MMS)and the Short Message Service (SMS). In the past he was mostly interested in vulnerability analysis and offensive security but recently switched his focus the defensive side to develop mitigations and countermeasures. Collin received a ph. D. in computer science from Technische Universitat Berlin; earlier he completed his M.S. and B.s. in computer science at uC santa barbara and fh darmstadt Ridley (as his colleagues refer to him) is a security researcher and author with more than 10 years of experience in software development, software security, and reverse engineering. In that last few years Stephen has presented his research and spoken about reverse engineering and software security on every continent (except Antarctica). Previously Stephen served as the Chief Information Security Officer of simple. com a new kind of online bank. before that stephen was senior researcher at matasano Security and a founding member of the security and Mission Assurance(SMa) group at a major U.s defense contractor, where he specialized in vulnerability research, reverse engineering, and"offensive software"in support of the U.S. Defense and Intelligence community. At pres- ent, Stephen is principal researcher at Xipiter (an information security r&D firm that has also developed a new kind of low-power smart-sensor device) Recently, Stephen and his work have been featured on NPR and NBC and in Wired, the Washington Post, Fast Company, VentureBeat, Slashdot, The Register, and other publications Georg Wicherski is Senior Security Researcher at CrowdStrike Georg particularly enjoys tinkering with the low-level parts in computer security hand-tuning custom-written shellcode and getting the last percent in exploit reliability stable. Before joining CrowdStrike, Georg worked at Kaspersky and McAfee. At BlackHat USA 2012, Joshua and georg demonstrated successfully exploiting the Android 4.0.1 browser via NFC. He spoke at REcon, Sy Scan, BlackHat USA and Japan, 26C3, ph-Neutral, INBOT, and various other confer ences. With his local ctf team Old EurOpe, he participated in countless and won numerous competitions ffirs indd 01: 50: 14: PM 02/ 28/2014 Page vi About the technical editor Rob shimonski( )is a best-selling author and editor with over 15 years experience developing, producing and distributing print media in the form of books, magazines, and periodicals. To date, rob has successfully created over 100 books that are currently in circulation. Rob has worked for countless companies that include CompTIA, Microsoft, Wiley, McGraw Hill Education, Cisco, the National Security Agency, and digidesign Rob has over 20 years experience working in IT, networking, systems, and security. He is a veteran of the US military and has been entrenched in security topics for his entire professional career. In the military rob was assigned to a communications (radio) battalion supporting training efforts and exercises Having worked with mobile phones practically since their inception, Rob is an expert in mobile phone development and security ffirs indd01:50:14PM02/28/2014 ffirs indd 01: 50: 14: PM 02/28/2014 Page viii 【实例截图】
【核心代码】
标签:
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论