From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Understanding mobile platform attack vectors

Understanding mobile platform attack vectors

From the course: Certified Ethical Hacker (CEH)

Understanding mobile platform attack vectors

- So cell phones have been in all of our pockets for a good 15, 20 years now, and 99% of those devices are running either Android or Apple's iOS. Mobile internet usage surpassed desktop usage. We're all sitting there on our phone on the couch or in bed rather than sitting on a laptop. So because we have 99% coverage with Android and iOS, that's what we're probably going to be focusing our attacks on. If you were hired as sort of a, you know, a white hat security assessor and you need to look at a mobile application from your client, it's most likely going to be running on either Android or iOS. We have a chart over here on the right, data came from IDC showing sort of market share of the various vendors for smartphone manufacturers. Mobile apps come in a few different flavors. We have native apps, web apps, and hybrid apps. Native apps are actually using the software development kit that is provided by the vendor of the operating system. So Apple has an iOS SDK, Android from Google…

Contents