O'Reilly logo

Android Security Cookbook by Scott Alexander-Bown, Keith Makan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Exploiting Applications

In this chapter, we will cover the following recipes:

  • Information disclosure via logcat
  • Inspecting the network traffic
  • Passive intent sniffing via the activity manager
  • Attacking services
  • Attacking broadcast receivers
  • Enumerating vulnerable content providers
  • Extracting data from vulnerable content providers
  • Inserting data into content providers
  • Enumerating SQL-injection vulnerable content providers
  • Exploiting debuggable applications
  • Man-in-the-middle attacks on applications

Introduction

So far, we've covered some of the basic development and security assessment tools, and we even covered some examples of extending and customizing these tools. This chapter will focus on the use of these tools to analyze the Android applications ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required