|
Books > Computing & IT > Social & legal aspects of computing > Computer viruses
A comprehensive guide to Android forensics, from setting up the
workstation to analyzing key artifacts Key Features Get up and
running with modern mobile forensic strategies and techniques
Analyze the most popular Android applications using free and open
source forensic tools Learn malware detection and analysis
techniques to investigate mobile cybersecurity incidents Book
DescriptionMany forensic examiners rely on commercial, push-button
tools to retrieve and analyze data, even though there is no tool
that does either of these jobs perfectly. Learning Android
Forensics will introduce you to the most up-to-date Android
platform and its architecture, and provide a high-level overview of
what Android forensics entails. You will understand how data is
stored on Android devices and how to set up a digital forensic
examination environment. As you make your way through the chapters,
you will work through various physical and logical techniques to
extract data from devices in order to obtain forensic evidence. You
will also learn how to recover deleted data and forensically
analyze application data with the help of various open source and
commercial tools. In the concluding chapters, you will explore
malware analysis so that you'll be able to investigate
cybersecurity incidents involving Android malware. By the end of
this book, you will have a complete understanding of the Android
forensic process, you will have explored open source and commercial
forensic tools, and will have basic skills of Android malware
identification and analysis. What you will learn Understand Android
OS and architecture Set up a forensics environment for Android
analysis Perform logical and physical data extractions Learn to
recover deleted data Explore how to analyze application data
Identify malware on Android devices Analyze Android malware Who
this book is forIf you are a forensic analyst or an information
security professional wanting to develop your knowledge of Android
forensics, then this is the book for you. Some basic knowledge of
the Android mobile platform is expected.
Master the art of penetration testing with Metasploit Framework in
7 days About This Book * A fast-paced guide that will quickly
enhance your penetration testing skills in just 7 days * Carry out
penetration testing in complex and highly-secured environments. *
Learn techniques to Integrate Metasploit with industry's leading
tools Who This Book Is For If you are a penetration tester, ethical
hacker, or security consultant who quickly wants to master the
Metasploit framework and carry out advanced penetration testing in
highly secured environments then, this book is for you. What You
Will Learn * Get hands-on knowledge of Metasploit * Perform
penetration testing on services like Databases, VOIP and much more
* Understand how to Customize Metasploit modules and modify
existing exploits * Write simple yet powerful Metasploit automation
scripts * Explore steps involved in post-exploitation on Android
and mobile platforms. In Detail The book starts with a hands-on Day
1 chapter, covering the basics of the Metasploit framework and
preparing the readers for a self-completion exercise at the end of
every chapter. The Day 2 chapter dives deep into the use of
scanning and fingerprinting services with Metasploit while helping
the readers to modify existing modules according to their needs.
Following on from the previous chapter, Day 3 will focus on
exploiting various types of service and client-side exploitation
while Day 4 will focus on post-exploitation, and writing quick
scripts that helps with gathering the required information from the
exploited systems. The Day 5 chapter presents the reader with the
techniques involved in scanning and exploiting various services,
such as databases, mobile devices, and VOIP. The Day 6 chapter
prepares the reader to speed up and integrate Metasploit with
leading industry tools for penetration testing. Finally, Day 7
brings in sophisticated attack vectors and challenges based on the
user's preparation over the past six days and ends with a
Metasploit challenge to solve. Style and approach This book is all
about fast and intensive learning. That means we don't waste time
in helping readers get started. The new content is basically about
filling in with highly-effective examples to build new things, show
solving problems in newer and unseen ways, and solve real-world
examples.
An easy to digest practical guide to Metasploit covering all
aspects of the framework from installation, configuration, and
vulnerability hunting to advanced client side attacks and
anti-forensics. About This Book * Carry out penetration testing in
highly-secured environments with Metasploit * Learn to bypass
different defenses to gain access into different systems. * A
step-by-step guide that will quickly enhance your penetration
testing skills. Who This Book Is For If you are a penetration
tester, ethical hacker, or security consultant who wants to quickly
learn the Metasploit framework to carry out elementary penetration
testing in highly secured environments then, this book is for you.
What You Will Learn * Get to know the absolute basics of the
Metasploit framework so you have a strong foundation for advanced
attacks * Integrate and use various supporting tools to make
Metasploit even more powerful and precise * Set up the Metasploit
environment along with your own virtual testing lab * Use
Metasploit for information gathering and enumeration before
planning the blueprint for the attack on the target system * Get
your hands dirty by firing up Metasploit in your own virtual lab
and hunt down real vulnerabilities * Discover the clever features
of the Metasploit framework for launching sophisticated and
deceptive client-side attacks that bypass the perimeter security *
Leverage Metasploit capabilities to perform Web application
security scanning In Detail This book will begin by introducing you
to Metasploit and its functionality. Next, you will learn how to
set up and configure Metasploit on various platforms to create a
virtual test environment. You will also get your hands on various
tools and components used by Metasploit. Further on in the book,
you will learn how to find weaknesses in the target system and hunt
for vulnerabilities using Metasploit and its supporting tools.
Next, you'll get hands-on experience carrying out client-side
attacks. Moving on, you'll learn about web application security
scanning and bypassing anti-virus and clearing traces on the target
system post compromise. This book will also keep you updated with
the latest security techniques and methods that can be directly
applied to scan, test, hack, and secure networks and systems with
Metasploit. By the end of this book, you'll get the hang of
bypassing different defenses, after which you'll learn how hackers
use the network to gain access into different systems. Style and
approach This tutorial is packed with step-by-step instructions
that are useful for those getting started with Metasploit. This is
an easy-to-read guide to learning Metasploit from scratch that
explains simply and clearly all you need to know to use this
essential IT power tool.
|
|