Index
A
adb pull command
Android apps, environment/lab
Android Debug Bridge (ADB)
Android Open Source Project (AOSP) system
Android Studio
AVD
SDK
virtual device
Android Studio 3.6
Android Virtual Device Manager
apksigner
App licensing/SafetNet
Android Studio
API key
Attest.kt file
back-end server
back-end source code, build
end
payload
pseudocode
validation
commercial apps
MainActivity.kt file
naming,project
security threats
steps
ARM Cortex-A processor
ARP Spoofing attack
B
b.a() method
Breaker tools
Burp Suite
ARP
Frida
JEB
MiTM
pseudocode
SSL Pinning
startup screen
traffic
C
checkServerTrusted() method
CISO
Continuous integration/continuous delivery (CI/CD)
Cross-site scripting (XSS)
CTO
D
Data privacy
definition
developer
swatting
Data security
directory
encryption
network security
sensitive information, calling up
Domain Validation (DV)
Dynamic analysis
activity package
adb statement
APK
apksigner
jarsigner
JEB’s debugger
app package hierarchy
debuggable Flag
debugger dialog
debugging
Frida
gamestate package
HashMap
JEB’s debugger
keystore
local variables
repackage the APK
E
Extended Validation (EV)
F
find .-type f |grep OnBoardingActivity command
Flutter
assets directory
certificate verification
demo app
networking
SecurityContext
server certificate
SSL Pinning
system overview
Frida
MacOS,
Python 2
G
gamestate package
getAnswers() method
GetVerify() function
Go compiler
Gojek
Golang
Android
Android NDK
ARM
gomobile
HTTP library
HTTP response
Keymaster
netutils package
Project Structure
REE
SSL
TAP SDK
TEE
Gooligan
H
Hacking, Android app
APK file, running unzip
adb
developer mode
ls-al
package manager
CISO
closed system
CTO
leadership roles
static analysis
APKTool
definition
JEB
HashMap.put() method
HTTP communication mechanisms
I
image_cache directory
IntelliJ IDEA software
isRooted() method
J, K
Jarsigner
JSON Web Signature (JWS)
L
Launching Attacks via Phones
M
magiskhide
magisk_patched.img
Malware
definition
Gooligan
SnapPea
Man-in-the-middle (MiTM)
Model-view-controller (MVC)
N
NOP or No Operation
O
Organizational Validation (OV)
P, Q
pm list command
pm path [PACKAGE] command
Public key infrastructure (PKI)
put() method
R
requestAttest() method
Rich Execution Environment (REE)
Root
Android factory images
API keys and back-end system passwords
boot.img file
character space
debugging tools
definition
detecting/hiding
app’s build.gradle file
categories
Magiskhide
MainActivity.kt
device bootloader, unlock
examining filesysytem
Google Pixel XL
Magisk Manager
modified boot.img, flashing
OEM bundled system applications
safely
testing Frida
S
s_client command
secure world
Securing apps, ”at scale”
base program
app-release-plain.apk
automatic string decryption
b.a()
Android Studio’s build.gradle file
class naming
command
Docker Hub
MainActivity.class file
MainActivity.kt source code
nonalphabetic characters
reversed MainActivity.class file
reversed MainActivity.class file, ProGuard
reversed TestModule.class file
testModule.kt source code
class remaining
NOP/code injection
spaghetti code/control flow alteration
string encryption
vulnerability assessment
shared_prefs directories
SSL pinning
Android client
back-end server
breaking SSL
certificates
Certbot
DV
EV
OV
self-signed
verification
connection
handshake
Network Security Configuration
OpenSSL
techniques
testing traffic interception, Brup Suite
Static source code security analysis
developer training
example
missing source code
setting up
third-party libraries/dependencies
“trust but verify” ethos
StringBuilder’s append method
T, U
Trusted Application Protection (TAP)
Trusted Execution Environment (TEE)
V, W, X, Y, Z
validate() method
Vulnerability assessment
automation
Blue Team
Compliance Team
development life cycle
improvements
Red Team
Visualizing Team
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.250.169