Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book * Gain insights into the current threat landscape of mobile applications in particular * Explore the different options that are available on mobile platforms and prevent circumventions made by attackers * This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing. What You Will Learn * Gain an in-depth understanding of Android and iOS architecture and the latest changes * Discover how to work with different tool suites to assess any application * Develop different strategies and techniques to connect to a mobile device * Create a foundation for mobile application security principles * Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device * Get to know secure development strategies for both iOS and Android applications * Gain an understanding of threat modeling mobile applications * Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. It has transitioned from “should it be done?” to “it must be done!“Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application develope …