PDF Title | Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition |
---|---|
Pages | 792 Pages |
PDF Size | 21.8 MB |
Language | English |
Sub-Category | |
Source | mhprofessional.com |
Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition – Download
As consumers are adopting new technologies and making them part of their lives, malware authors are changing their approach and migrating to these technologies. The smartphone as an omnipresent device that makes the Internet always available has a growing malware concern. Trojans trying to steal personal data, backdoors trying to allow attackers to access the device, and adware trying to generate revenue for their authors are just some of the potential threats present in the mobile world.
Android and iOS malware analysis and reverse engineering follow mostly the traditional Windows malware analysis approaches, but they also bring some new challenges. Understanding the specific platform ecosystem and design differences will allow you to efficiently analyze applications and determine any malicious intent. As malware shifts its focus to new technologies, it important that malware researchers follow up and develop adequate analysis tools and techniques.