Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
Vijay Kumar Velu

#Mobile_Application
#Penetration_Testing
#Attacks
#Security
#Android
#iOS
Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing.
Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured.
This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches.
This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats.
Table of Contents
Chapter 1: The Mobile Application Security Landscape
Chapter 2: Snooping Around the Architecture
Chapter 3: Building a Test Environment
Chapter 4: Loading up - Mobile Pentesting Tools
Chapter 5: Building Attack Paths - Threat Modeling an Application
Chapter 6: Full Steam Ahead - Attacking Android Applications
Chapter 7: Full Steam Ahead - Attacking iOS Applications
Chapter 8: Securing Your Android and iOS Applications
About the Author
Vijay Kumar Velu is a Passionate Information Security Practitioner, Author, Speaker, Blogger, and Investor. He has almost years 2 decades of IT industry experience, is a Licensed Penetration Tester and has specialized in providing technical solutions to a variety of Cyber Problems, ranging from Simple Security configuration to Complex Cyber Risk Modelling. He holds multiple security qualifications including Certified Ethical Hacker, EC-council Certified Security Analyst, and Computer Hacking Forensics Investigator.









