- Joined
- May 21, 2024
- Messages
- 358
- Reaction score
- 7,289
- Points
- 93
- Thread Author
- #1
Language : Russian!!!!!
NOT IN ENGLISH!!
The internal architecture of the Android OS, the partitions and file systems it uses, the operating principle of update mechanisms and internal security tools are considered. It talks about access control in the Android OS, privileges, methods of obtaining root rights, customization and installation of non-standard
firmware. Tools for disassembling, debugging and analyzing code of mobile applications are described, examples of code modification are given in order to change software functions and introduce third-party modules into the application. Detailed recommendations are given for deobfuscation of code and bypassing anti-debugging, as well as practical tips for protecting your own applications from decompilation and research. Provides information about malware. programs for the Android platform, the vulnerabilities they use, and examples of code for such programs are given. Describes the use of standard Android functions for non-standard purposes and ways to counter malware. The second edition provides information about the changes and innovations in Android 14.
NOT IN ENGLISH!!
The internal architecture of the Android OS, the partitions and file systems it uses, the operating principle of update mechanisms and internal security tools are considered. It talks about access control in the Android OS, privileges, methods of obtaining root rights, customization and installation of non-standard
firmware. Tools for disassembling, debugging and analyzing code of mobile applications are described, examples of code modification are given in order to change software functions and introduce third-party modules into the application. Detailed recommendations are given for deobfuscation of code and bypassing anti-debugging, as well as practical tips for protecting your own applications from decompilation and research. Provides information about malware. programs for the Android platform, the vulnerabilities they use, and examples of code for such programs are given. Describes the use of standard Android functions for non-standard purposes and ways to counter malware. The second edition provides information about the changes and innovations in Android 14.
To see this hidden content, you must reply and react with one of the following reactions : Like, Love, Haha, Wow