i
History and Features Of Android
Android Application and API Level
Android IDE (Integrated Development Environment)
Authentication (Cryptographic Key Storage, User Authenticators, Biometrics)
Encryption (File Based Encryption, MetaData Encryption, Enabling Adiantum)
GoogleBouncer (SecurityFeatures and Attacks(Delayed & Update) to bypass it)
AndroidManifest.xml (Important File Contents present)
Reverse Engineering
Basic Command
Jailbreaking can be defined as a process of installing a modified set of kernel patches that allows users to run third party applications not signed by OS vendor.
It provides root level access of the operating system and permits downloading of third party applications, themes, extensions on an iOS devices.
It removes sandbox instructions, enabling malicious applications to get access to restricted mobile resources and information. Types of jailbreaking: Tethered, Semi- Tethered and Untethered
Types Of jailbreaking exploits: -
1. Userland Exploit: It allows user-level access but does not allow iboot-level access.
2. iBoot Exploit: An iBoot jailbreak allows user-level and iboot-level access.
3. Bootrom Exploit: It allows user-level access and iboot-level access.
Don't miss out!