Penetration Testing with Kali Nethunter Hands-on Android and iOS Penetration Testing
Material type:
TextPublication details: New Delhi BPB Publications 2025Description: 322pISBN: - 9789355516510
- 005.8 ROY/P
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
Reference
|
IIIT Kottayam Central Library Reference | 005.8 ROY/P (Browse shelf(Opens below)) | Not For Loan | 2955 | ||||
|
|
IIIT Kottayam Central Library General Stacks | 005.8 ROY/P (Browse shelf(Opens below)) | 1 | Available | 2956 | |||
|
|
IIIT Kottayam Central Library General Stacks | 005.8 ROY/P (Browse shelf(Opens below)) | 2 | Available | 2957 |
Browsing IIIT Kottayam Central Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
1. Introduction to Mobile Penetration Testing
2. Setting Up Your Device
3. Mobile Penetration Testing Methodology
4. Attacking Android Applications
5. Attacking iOS Applications
6. Mobile Device Penetration Testing for Web Applications
7. Working with Kali NetHunter
8. Advanced Pentesting Techniques
9. Developing a Vulnerability Remediation Plan
10. Detecting Vulnerabilities on Android Apps
11. Hands-on Practice: Vulnerable iOS Apps
12. Mobile Security Career Roadmap
13. The Future of Pentesting and Security Trends
There are no comments on this title.