i
History and Features Of Android
Android Application and API Level
Android IDE (Integrated Development Environment)
Authentication (Cryptographic Key Storage, User Authenticators, Biometrics)
Encryption (File Based Encryption, MetaData Encryption, Enabling Adiantum)
GoogleBouncer (SecurityFeatures and Attacks(Delayed & Update) to bypass it)
AndroidManifest.xml (Important File Contents present)
Reverse Engineering
Basic Command
Try to root an Android phone and gain administrative access using tools such as SuperOneClick, Superboot, One Click Root, etc
Using tool such as Andosid, LOIC we can perform Dos and Ddos attacks on Android phone.
Check whether cross-application-scripting-error is present in Android browser which allows hackers to easily hack the Android device and try to break down the web browser's sandbox using infected javascript code.
Check whether password is stored in email as plain text using SQLite database and also check whether Skype on Android uses unencrypted SQLite database to store contacts, profile information, and instant message logs.
Try to exploit Android Intents to obtain user's private information.
We can use ComDroid to detect application's communication vulnerabilities.
We can use tool Woodpecker to detect capability leaks in Android devices.
Don't miss out!