• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Android Evgeny Zobnin | Android through the eyes of a hacker. 2nd ed. (2024) - Russian language

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
32
Reaction score
45,552
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
81f3cfe0.jpg


The article examines the internal architecture of the Android OS, the partitions and file systems it uses, the operating principle of update mechanisms and internal security tools. It discusses access control in the Android OS, privileges, methods for obtaining root rights, customization and installation of non-standard firmware. It describes tools for disassembling, debugging and analyzing the code of mobile applications, provides examples of modifying the code in order to change the functions of the software and introduce third-party modules into the application. It provides detailed recommendations for deobfuscation of code and bypassing anti-debugging, as well as practical advice on protecting your own applications from decompilation and research. It provides information about malicious programs for the Android platform, the vulnerabilities they use, and provides examples of code for such programs. It discusses the use of standard Android functions for non-standard purposes and ways to counteract malware.

 
Back
Top