Chapter 4. Exploiting Applications
In this chapter, we will cover the following recipes:
- Information disclosure via logcat
- Inspecting the network traffic
- Passive intent sniffing via the activity manager
- Attacking services
- Attacking broadcast receivers
- Enumerating vulnerable content providers
- Extracting data from vulnerable content providers
- Inserting data into content providers
- Enumerating SQL-injection vulnerable content providers
- Exploiting debuggable applications
- Man-in-the-middle attacks on applications