i
History and Features Of Android
Android Application and API Level
Android IDE (Integrated Development Environment)
Authentication (Cryptographic Key Storage, User Authenticators, Biometrics)
Encryption (File Based Encryption, MetaData Encryption, Enabling Adiantum)
GoogleBouncer (SecurityFeatures and Attacks(Delayed & Update) to bypass it)
AndroidManifest.xml (Important File Contents present)
Reverse Engineering
Basic Command
Try to Jailbreak the iPhone using tools such as Pangu, evasion7, Redsnow, Absinthe, Snowbreeze, Pwnagetool, etc.
Unlock the iPhone sim using tools such as iPhoneSimFree and anySIM
Hold the power button of an iOS operating device till the power off message appears. Close the smart cover till the screen shuts and open the smart cover after few seconds. Press the cancel button to bypass password code security.
Using Metasploit tool to exploit iPhone vulnerabilities. Send malicious code as payload to gain access to the device
Setup Access Point with same name and encryption type
Perform man-in-the-middle/SSL Stripping attack by intercepting wireless parameters of iOS device on Wifi network. Send malicious packets on Wi-fi network using Cain & Abel tool
Use social engineering techniques such as sending emails, SMS the user to trick him to open links that contain malicious web pages.
Don't miss out!