SlideShare une entreprise Scribd logo
1  sur  47
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                           Android (Java)
                                                      First Steps
                                                          (By Rich Helton)
                                                              Android (Rev 1)

                                                               State of Colorado
                                                            Office of Cyber Security

                                                                                                                                        State of Colorado Office of Cyber Security
Android
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         From http://en.wikipedia.org/wiki/Android_(operating_system),
         Android is a software stack for mobile devices that includes an
        operating system, middleware and key applications.
         Androids mobile operating system is based on the Linux kernel.
         The Android open-source software stack consists of Java
        applications running on a Java-based, object-oriented application
        framework on top of Java core libraries running on a Dalvik virtual
        machine JIT compilation.
         To me, Android is a Java framework with many underlying C
        libraries that run in an embedded Linux environment. As an
        embedded system, there are many performance and memory
        constraints based on hardware of a mobile device.



                                                                                                                                        State of Colorado Office of Cyber Security
Android pieces
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         For Database work, Android comes with a stripped down database
        server called SQLite, which is an embedded relational database
        management system. http://en.wikipedia.org/wiki/SQLite and
        www.sqlite.org
         For Animation, OpenGL ES (Embedded Systems), is used for 3D
        and 2D graphics applications,
        http://en.wikipedia.org/wiki/OpenGL_ES
         For the Android User Interface, the system uses a comparable RIA
        interface using the XML User Interface Language (XUL).
         There are many other packages that will be discussed later,
        including the REST interface for WebServices, Telephony API,
        Search API, Google Maps and more.




                                                                                                                                        State of Colorado Office of Cyber Security
Android Manifest
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         The Android Manifest file is an XML file that will define your
        Android application’s resources. It is similar to a J2EE web.xml file.
         Every Android application has one that will define many pieces to
        your application including images, permissions, UI pieces, and much
        more.
         See
        http://developer.android.com/guide/topics/manifest/manifest-intro.html




                                                                                                                                        State of Colorado Office of Cyber Security
Android Manifest
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         A sample manifest file in Eclipse:




                                                                                                                                        State of Colorado Office of Cyber Security
Android APK
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         Android will compile its project, including the manifest, into a APK
        file to run on the device, see
        http://en.wikipedia.org/wiki/APK_(file_format)




                                                                                                                                        State of Colorado Office of Cyber Security
Technical Resources
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         Various Sample applications can be found at
        http://developer.android.com/resources/browser.html?tag=sample
         A resource of Common tasks and how to do them in Android
        http://developer.android.com/resources/faq/commontasks.html such
        as displaying Alert Dialogs or Handling UI Events.




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   Android Development




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         To start Android development, the Java Development Kit needs to
        be installed locally. Depending on the local development environment
        will dictate which JDK to use.
         After installing the JDK, you should install the Eclipse IDE, the most
        popular cross platform IDE for Java development,
        http://en.wikipedia.org/wiki/Eclipse_(software)
         I like to use the Helios Eclipse for Java Developers
        http://www.eclipse.org/downloads/
         Installing the SDK can be found at
        http://developer.android.com/sdk/installing.html




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         After installing Helios, the Android Development Toolkit can be
        installed as a plugin by using the the Help Menu-> Install New
        Software and Add https://dl-ssl.google.com/android/eclipse :




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Instead of using the Eclipse IDE, command line development can
        be done using the Android Software Development Kit (SDK).
         The SDK can be installed, or downloaded, from
        http://developer.android.com/sdk/index.html
         After installation, you will have a Android SDK and AVD Manager to
        manage the build packages and virtual devices:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

        The Eclipse IDE needs to point to the Android SDK packages, using
        Windows->Preferences->Android:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Virtual Device (AVD)
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

        An AVD will have to be created for debugging, this is your target
        device,
        http://developer.android.com/resources/tutorials/hello-world.html




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Let’s start a New Android in Eclipse, File -> New->Project,
        http://developer.android.com/guide/developing/projects/projects-eclipse.html
        :




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         A basic “HelloWorld” project:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         A basic “HelloWorld” project in just the SDK, no Eclipse, from the
        SDK command line:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Create some code, like showing a TextView with “Hello World”:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Select Run-Run, select “Android Application” and wait for the
        emulator to start:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         It prints:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Emulator
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         In order to debug/run an Android application, a Android emulator,
        to simulate a virtual phone will need to be set up through the ADT.
        See
        http://developer.android.com/guide/developing/tools/emulator.html
         A hardware device can also be used,
        http://developer.android.com/guide/developing/device.html




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   Android UI




                                                                                                                                        State of Colorado Office of Cyber Security
Android UI
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           As mentioned earlier, XUL can be used to define the Android UI,
          instead of programmatic code like the previous TextView class.
           Let’s look an example of XUL, using DroidDraw from
          http://droiddraw.org/ we can draw a UI and generate the XML:




                                                                                                                                        State of Colorado Office of Cyber Security
Droid Draw
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           Showing TextView in DroidDraw:




                                                                                                                                        State of Colorado Office of Cyber Security
The View
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         The are several components to the UI.
         One component is the View. TextView is derived from View.
         The View class represents the basic building block for the interface
        components.
        http://developer.android.com/reference/android/view/View.html
         The View can be part of ViewGroup, and needs to have defined
        layout http://developer.android.com/guide/topics/ui/index.html
         A Layout will define how the View will display its objects, or
        widgets,
        http://developer.android.com/guide/topics/ui/layout-objects.html
         The layout is the architecture for the UI in an Activity. It will define
        how the elements appear to the user,
        http://developer.android.com/guide/topics/ui/declaring-layout.html



                                                                                                                                        State of Colorado Office of Cyber Security
Hello, Views
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         http://developer.android.com/resources/tutorials/views/index.html
        contains a collection of different “Hello World” tutorials in various
        layouts.
         An example is the Grid View, which displays items in a two-
        dimensional, scrollable grid.
        http://developer.android.com/resources/tutorials/views/hello-gridview.html
         Others include Linear Layouts, Relatove Layout, Table Layout,
        Tab Layout, and List Views.
         There are also tutorials for widgets like Date Picker, Time Picker,
        Google Maps, Web View, Gallery, Spinner, Form Stuff and Auto
        Complete.




                                                                                                                                        State of Colorado Office of Cyber Security
Droid Draw
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Using Droid Draw to display a Table Layout with a GridView and
        Radio Buttons:




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   The Emulator




                                                                                                                                        State of Colorado Office of Cyber Security
The Emulator
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Using the Emulator
        http://developer.android.com/guide/developing/devices/emulator.html
         There are several ways to interface to the Emulator, DDMS, ADB,
        and telnet.




                                                                                                                                        State of Colorado Office of Cyber Security
Package Browser
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Menu->Package Browser




                                                                                                                                        State of Colorado Office of Cyber Security
Telnetting
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Telnet from the local machine “telnet localhost 5554”:




        “help” for the commands:




                                                                                                                                        State of Colorado Office of Cyber Security
Make a call through telnet
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         “gsm call 3031234” :




                                                                                                                                        State of Colorado Office of Cyber Security
DDMS
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         The Eclipse DDMS can attach to a running emulator (Start Eclipse
        first), and just explore the files:




                                                                                                                                        State of Colorado Office of Cyber Security
DDMS call
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Make a call through DDMS,
        http://developer.android.com/guide/developing/debugging/ddms.html :




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   WebView and WebKit




                                                                                                                                        State of Colorado Office of Cyber Security
Webkit.WebView
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Adding items to the Screen Menu
        http://developer.android.com/resources/faq/commontasks.html#filelist




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   SQLite




                                                                                                                                        State of Colorado Office of Cyber Security
SQLite
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           Android comes preconfigured with a embedded version of SQLite,
          http://www.sqlite.org/
           There are several GUI tools that can be used to administrate
          SQLite database, included http://sqliteman.com/ the GUI for SQLite 3.
           The database itself can be examined through adb as a remote shell
          http://developer.android.com/guide/developing/tools/adb.html#sqlite
           The Notepad Tutorial , Exercise 1, uses SQLite to store notes
          http://developer.android.com/resources/tutorials/notepad/notepad-ex1.html




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   Debugging




                                                                                                                                        State of Colorado Office of Cyber Security
Debugging
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           Debugging information can be found at
          http://developer.android.com/guide/developing/debugging/index.html
           Android is shipped with the Dalvik Debug Monitor Server (DDMS),
          which provides port-facing services, screen capture on the device,
          thread and heap information, logcat, and much more.
          http://developer.android.com/guide/developing/debugging/ddms.html
           Android Debug Bridge (adb) is a versatile command line tool that
          lets you communicate with an emulator instance or connected
          Android-powered device.
          http://developer.android.com/guide/developing/tools/adb.html
          TraceView is a graphical viewer for execution logs that you create
          using the Debug class to log tracing information in your code.
          http://developer.android.com/guide/developing/debugging/debugging-tracing




                                                                                                                                        State of Colorado Office of Cyber Security
DDMS
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           From Eclipse, select Windows->Open Perspective->Other ->
          DDMS:




                                                                                                                                        State of Colorado Office of Cyber Security
DDMS
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   ADB




                                                                                                                                        State of Colorado Office of Cyber Security
ADB
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           The Android Debug Bridge (ADB),
          http://developer.android.com/guide/developing/tools/adb.html




                                                                                                                                        State of Colorado Office of Cyber Security
ADB Shell
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           ADB can run a shell into the emulator, or remote device, here’s the
          databases, “ls –R /data/data/*/databases” :




                                                                                                                                        State of Colorado Office of Cyber Security
ADB install
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
          Installing APK applications, “abd –s emulator-554 install” :




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   Android Notepad
                                   Tutorial


                                                                                                                                        State of Colorado Office of Cyber Security
Android Tutorial
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           There is a popular tutorial to walk the programmer through many of
          the features of Android called the Notepad Tutorial,
          http://developer.android.com/resources/tutorials/notepad/index.html
          




                                                                                                                                        State of Colorado Office of Cyber Security

Contenu connexe

Tendances

Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentestingNull Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentestingRomansh Yadav
 
Mobile security part 2
Mobile security part 2Mobile security part 2
Mobile security part 2Romansh Yadav
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...Consulthinkspa
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsBlrDroid
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security WorkshopOWASP
 
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperAjin Abraham
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android SecurityAsanka Dilruk
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Stephan Chenette
 
Mobile security
Mobile securityMobile security
Mobile securityStefaan
 
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
.NET MALWARE THREATS -- BHACK CONFERENCE 2019.NET MALWARE THREATS -- BHACK CONFERENCE 2019
.NET MALWARE THREATS -- BHACK CONFERENCE 2019Alexandre Borges
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Moataz Kamel
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applicationsh4oxer
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration TestingStephan Chenette
 
Bypassing the Android Permission Model
Bypassing the Android Permission ModelBypassing the Android Permission Model
Bypassing the Android Permission ModelGeorgia Weidman
 

Tendances (20)

Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentestingNull Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
 
Mobile security part 2
Mobile security part 2Mobile security part 2
Mobile security part 2
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android Applications
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applications
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - Whitepaper
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
 
Mobile security
Mobile securityMobile security
Mobile security
 
Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)
 
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
.NET MALWARE THREATS -- BHACK CONFERENCE 2019.NET MALWARE THREATS -- BHACK CONFERENCE 2019
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applications
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
 
Bypassing the Android Permission Model
Bypassing the Android Permission ModelBypassing the Android Permission Model
Bypassing the Android Permission Model
 
Android Security
Android SecurityAndroid Security
Android Security
 

En vedette

Android Development: The Basics
Android Development: The BasicsAndroid Development: The Basics
Android Development: The BasicsMike Desjardins
 
Modul oop with java application mauludin
Modul oop with java application   mauludinModul oop with java application   mauludin
Modul oop with java application mauludinMauludin Ahmad
 
The Game Of Life - Java‘s Siblings and Heirs are populating the Ecosystem
The Game Of Life - Java‘s Siblings and Heirs are populating  the EcosystemThe Game Of Life - Java‘s Siblings and Heirs are populating  the Ecosystem
The Game Of Life - Java‘s Siblings and Heirs are populating the Ecosystemjexp
 
KC Java Android Talk (March 2011)
KC Java Android Talk (March 2011)KC Java Android Talk (March 2011)
KC Java Android Talk (March 2011)osake
 
Introduction to Android Development
Introduction to Android DevelopmentIntroduction to Android Development
Introduction to Android DevelopmentProf. Erwin Globio
 
Google I/O 2013 報告会 Android Studio と Gradle
Google I/O 2013 報告会 Android Studio と GradleGoogle I/O 2013 報告会 Android Studio と Gradle
Google I/O 2013 報告会 Android Studio と GradleKeishin Yokomaku
 
Games and Java ME - Have fun and earn some money
Games and Java ME - Have fun and earn some moneyGames and Java ME - Have fun and earn some money
Games and Java ME - Have fun and earn some moneyMarcelo Quinta
 
Practical OOP In Java
Practical OOP In JavaPractical OOP In Java
Practical OOP In Javawiradikusuma
 
Fundamental of android
Fundamental of androidFundamental of android
Fundamental of androidAdarsh Patel
 
Workshop on android ui
Workshop on android uiWorkshop on android ui
Workshop on android uiAdarsh Patel
 
Java for android developers
Java for android developersJava for android developers
Java for android developersAly Abdelkareem
 
Introduction to Android and Android Studio
Introduction to Android and Android StudioIntroduction to Android and Android Studio
Introduction to Android and Android StudioSuyash Srijan
 

En vedette (20)

Android Development: The Basics
Android Development: The BasicsAndroid Development: The Basics
Android Development: The Basics
 
Introduction to java
Introduction to javaIntroduction to java
Introduction to java
 
Java tutorial PPT
Java tutorial PPTJava tutorial PPT
Java tutorial PPT
 
Modul oop with java application mauludin
Modul oop with java application   mauludinModul oop with java application   mauludin
Modul oop with java application mauludin
 
The Game Of Life - Java‘s Siblings and Heirs are populating the Ecosystem
The Game Of Life - Java‘s Siblings and Heirs are populating  the EcosystemThe Game Of Life - Java‘s Siblings and Heirs are populating  the Ecosystem
The Game Of Life - Java‘s Siblings and Heirs are populating the Ecosystem
 
KC Java Android Talk (March 2011)
KC Java Android Talk (March 2011)KC Java Android Talk (March 2011)
KC Java Android Talk (March 2011)
 
GUI Programming with Java
GUI Programming with JavaGUI Programming with Java
GUI Programming with Java
 
Gu iintro(java)
Gu iintro(java)Gu iintro(java)
Gu iintro(java)
 
Introduction to Android Development
Introduction to Android DevelopmentIntroduction to Android Development
Introduction to Android Development
 
Google I/O 2013 報告会 Android Studio と Gradle
Google I/O 2013 報告会 Android Studio と GradleGoogle I/O 2013 報告会 Android Studio と Gradle
Google I/O 2013 報告会 Android Studio と Gradle
 
OOP in Java
OOP in JavaOOP in Java
OOP in Java
 
Games and Java ME - Have fun and earn some money
Games and Java ME - Have fun and earn some moneyGames and Java ME - Have fun and earn some money
Games and Java ME - Have fun and earn some money
 
Practical OOP In Java
Practical OOP In JavaPractical OOP In Java
Practical OOP In Java
 
java swing
java swingjava swing
java swing
 
Fundamental of android
Fundamental of androidFundamental of android
Fundamental of android
 
Workshop on android ui
Workshop on android uiWorkshop on android ui
Workshop on android ui
 
Java for android developers
Java for android developersJava for android developers
Java for android developers
 
Android Programming
Android ProgrammingAndroid Programming
Android Programming
 
Basic java for Android Developer
Basic java for Android DeveloperBasic java for Android Developer
Basic java for Android Developer
 
Introduction to Android and Android Studio
Introduction to Android and Android StudioIntroduction to Android and Android Studio
Introduction to Android and Android Studio
 

Similaire à First Steps in Android

Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power ManagementNilay Mishra
 
A case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsA case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsijmnct
 
From Reversing to Exploitation
From Reversing to ExploitationFrom Reversing to Exploitation
From Reversing to ExploitationSatria Ady Pradana
 
Getting started with android
Getting started with androidGetting started with android
Getting started with androidamitgb
 
Securing Android Applications
Securing Android ApplicationsSecuring Android Applications
Securing Android ApplicationsInfosys
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, androidJehad2012
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentestingMinali Arora
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
Mobile Application Development-Lecture 03 & 04.pdf
Mobile Application Development-Lecture 03 & 04.pdfMobile Application Development-Lecture 03 & 04.pdf
Mobile Application Development-Lecture 03 & 04.pdfAbdullahMunir32
 
Slides bootcamp21
Slides bootcamp21Slides bootcamp21
Slides bootcamp21dxsaki
 
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceFrom Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceSatria Ady Pradana
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Satheesh Kumar V
 

Similaire à First Steps in Android (20)

Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
A case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsA case study of malware detection and removal in android apps
A case study of malware detection and removal in android apps
 
From Reversing to Exploitation
From Reversing to ExploitationFrom Reversing to Exploitation
From Reversing to Exploitation
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
 
Securing Android Applications
Securing Android ApplicationsSecuring Android Applications
Securing Android Applications
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, android
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Mobile Application Development-Lecture 03 & 04.pdf
Mobile Application Development-Lecture 03 & 04.pdfMobile Application Development-Lecture 03 & 04.pdf
Mobile Application Development-Lecture 03 & 04.pdf
 
Android the future
Android  the futureAndroid  the future
Android the future
 
Cc4201519521
Cc4201519521Cc4201519521
Cc4201519521
 
Android security
Android securityAndroid security
Android security
 
Android security
Android securityAndroid security
Android security
 
Slides bootcamp21
Slides bootcamp21Slides bootcamp21
Slides bootcamp21
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceFrom Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in Essence
 
Android apps
Android appsAndroid apps
Android apps
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017
 

Plus de Rich Helton

Java for Mainframers
Java for MainframersJava for Mainframers
Java for MainframersRich Helton
 
I pad uicatalog_lesson02
I pad uicatalog_lesson02I pad uicatalog_lesson02
I pad uicatalog_lesson02Rich Helton
 
Mongo db rev001.
Mongo db rev001.Mongo db rev001.
Mongo db rev001.Rich Helton
 
NServicebus WCF Integration 101
NServicebus WCF Integration 101NServicebus WCF Integration 101
NServicebus WCF Integration 101Rich Helton
 
AspMVC4 start101
AspMVC4 start101AspMVC4 start101
AspMVC4 start101Rich Helton
 
Entity frameworks101
Entity frameworks101Entity frameworks101
Entity frameworks101Rich Helton
 
Tumbleweed intro
Tumbleweed introTumbleweed intro
Tumbleweed introRich Helton
 
Salesforce Intro
Salesforce IntroSalesforce Intro
Salesforce IntroRich Helton
 
LEARNING  iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
LEARNING	 iPAD STORYBOARDS IN OBJ-­‐C LESSON 1LEARNING	 iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
LEARNING  iPAD STORYBOARDS IN OBJ-­‐C LESSON 1Rich Helton
 
Learning C# iPad Programming
Learning C# iPad ProgrammingLearning C# iPad Programming
Learning C# iPad ProgrammingRich Helton
 
Overview of CSharp MVC3 and EF4
Overview of CSharp MVC3 and EF4Overview of CSharp MVC3 and EF4
Overview of CSharp MVC3 and EF4Rich Helton
 
C#Web Sec Oct27 2010 Final
C#Web Sec Oct27 2010 FinalC#Web Sec Oct27 2010 Final
C#Web Sec Oct27 2010 FinalRich Helton
 
Sql Injection and Entity Frameworks
Sql Injection and Entity FrameworksSql Injection and Entity Frameworks
Sql Injection and Entity FrameworksRich Helton
 
C# Security Testing and Debugging
C# Security Testing and DebuggingC# Security Testing and Debugging
C# Security Testing and DebuggingRich Helton
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall introRich Helton
 
Java Web Security Class
Java Web Security ClassJava Web Security Class
Java Web Security ClassRich Helton
 

Plus de Rich Helton (20)

Java for Mainframers
Java for MainframersJava for Mainframers
Java for Mainframers
 
I pad uicatalog_lesson02
I pad uicatalog_lesson02I pad uicatalog_lesson02
I pad uicatalog_lesson02
 
Mongo db rev001.
Mongo db rev001.Mongo db rev001.
Mongo db rev001.
 
NServicebus WCF Integration 101
NServicebus WCF Integration 101NServicebus WCF Integration 101
NServicebus WCF Integration 101
 
AspMVC4 start101
AspMVC4 start101AspMVC4 start101
AspMVC4 start101
 
Entity frameworks101
Entity frameworks101Entity frameworks101
Entity frameworks101
 
Tumbleweed intro
Tumbleweed introTumbleweed intro
Tumbleweed intro
 
Azure rev002
Azure rev002Azure rev002
Azure rev002
 
Salesforce Intro
Salesforce IntroSalesforce Intro
Salesforce Intro
 
LEARNING  iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
LEARNING	 iPAD STORYBOARDS IN OBJ-­‐C LESSON 1LEARNING	 iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
LEARNING  iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
 
Learning C# iPad Programming
Learning C# iPad ProgrammingLearning C# iPad Programming
Learning C# iPad Programming
 
NServiceBus
NServiceBusNServiceBus
NServiceBus
 
Overview of CSharp MVC3 and EF4
Overview of CSharp MVC3 and EF4Overview of CSharp MVC3 and EF4
Overview of CSharp MVC3 and EF4
 
Adobe Flex4
Adobe Flex4 Adobe Flex4
Adobe Flex4
 
C#Web Sec Oct27 2010 Final
C#Web Sec Oct27 2010 FinalC#Web Sec Oct27 2010 Final
C#Web Sec Oct27 2010 Final
 
Jira Rev002
Jira Rev002Jira Rev002
Jira Rev002
 
Sql Injection and Entity Frameworks
Sql Injection and Entity FrameworksSql Injection and Entity Frameworks
Sql Injection and Entity Frameworks
 
C# Security Testing and Debugging
C# Security Testing and DebuggingC# Security Testing and Debugging
C# Security Testing and Debugging
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall intro
 
Java Web Security Class
Java Web Security ClassJava Web Security Class
Java Web Security Class
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

First Steps in Android

  • 1. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Android (Java) First Steps (By Rich Helton) Android (Rev 1) State of Colorado Office of Cyber Security State of Colorado Office of Cyber Security
  • 2. Android CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  From http://en.wikipedia.org/wiki/Android_(operating_system),  Android is a software stack for mobile devices that includes an operating system, middleware and key applications.  Androids mobile operating system is based on the Linux kernel.  The Android open-source software stack consists of Java applications running on a Java-based, object-oriented application framework on top of Java core libraries running on a Dalvik virtual machine JIT compilation.  To me, Android is a Java framework with many underlying C libraries that run in an embedded Linux environment. As an embedded system, there are many performance and memory constraints based on hardware of a mobile device. State of Colorado Office of Cyber Security
  • 3. Android pieces CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  For Database work, Android comes with a stripped down database server called SQLite, which is an embedded relational database management system. http://en.wikipedia.org/wiki/SQLite and www.sqlite.org  For Animation, OpenGL ES (Embedded Systems), is used for 3D and 2D graphics applications, http://en.wikipedia.org/wiki/OpenGL_ES  For the Android User Interface, the system uses a comparable RIA interface using the XML User Interface Language (XUL).  There are many other packages that will be discussed later, including the REST interface for WebServices, Telephony API, Search API, Google Maps and more. State of Colorado Office of Cyber Security
  • 4. Android Manifest CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  The Android Manifest file is an XML file that will define your Android application’s resources. It is similar to a J2EE web.xml file.  Every Android application has one that will define many pieces to your application including images, permissions, UI pieces, and much more.  See http://developer.android.com/guide/topics/manifest/manifest-intro.html State of Colorado Office of Cyber Security
  • 5. Android Manifest CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  A sample manifest file in Eclipse: State of Colorado Office of Cyber Security
  • 6. Android APK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Android will compile its project, including the manifest, into a APK file to run on the device, see http://en.wikipedia.org/wiki/APK_(file_format) State of Colorado Office of Cyber Security
  • 7. Technical Resources CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Various Sample applications can be found at http://developer.android.com/resources/browser.html?tag=sample  A resource of Common tasks and how to do them in Android http://developer.android.com/resources/faq/commontasks.html such as displaying Alert Dialogs or Handling UI Events. State of Colorado Office of Cyber Security
  • 8. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Android Development State of Colorado Office of Cyber Security
  • 9. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  To start Android development, the Java Development Kit needs to be installed locally. Depending on the local development environment will dictate which JDK to use.  After installing the JDK, you should install the Eclipse IDE, the most popular cross platform IDE for Java development, http://en.wikipedia.org/wiki/Eclipse_(software)  I like to use the Helios Eclipse for Java Developers http://www.eclipse.org/downloads/  Installing the SDK can be found at http://developer.android.com/sdk/installing.html State of Colorado Office of Cyber Security
  • 10. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  After installing Helios, the Android Development Toolkit can be installed as a plugin by using the the Help Menu-> Install New Software and Add https://dl-ssl.google.com/android/eclipse : State of Colorado Office of Cyber Security
  • 11. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Instead of using the Eclipse IDE, command line development can be done using the Android Software Development Kit (SDK).  The SDK can be installed, or downloaded, from http://developer.android.com/sdk/index.html  After installation, you will have a Android SDK and AVD Manager to manage the build packages and virtual devices: State of Colorado Office of Cyber Security
  • 12. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE The Eclipse IDE needs to point to the Android SDK packages, using Windows->Preferences->Android: State of Colorado Office of Cyber Security
  • 13. Android Virtual Device (AVD) CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE An AVD will have to be created for debugging, this is your target device, http://developer.android.com/resources/tutorials/hello-world.html State of Colorado Office of Cyber Security
  • 14. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Let’s start a New Android in Eclipse, File -> New->Project, http://developer.android.com/guide/developing/projects/projects-eclipse.html : State of Colorado Office of Cyber Security
  • 15. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  A basic “HelloWorld” project: State of Colorado Office of Cyber Security
  • 16. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  A basic “HelloWorld” project in just the SDK, no Eclipse, from the SDK command line: State of Colorado Office of Cyber Security
  • 17. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Create some code, like showing a TextView with “Hello World”: State of Colorado Office of Cyber Security
  • 18. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Select Run-Run, select “Android Application” and wait for the emulator to start: State of Colorado Office of Cyber Security
  • 19. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  It prints: State of Colorado Office of Cyber Security
  • 20. Android Emulator CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  In order to debug/run an Android application, a Android emulator, to simulate a virtual phone will need to be set up through the ADT. See http://developer.android.com/guide/developing/tools/emulator.html  A hardware device can also be used, http://developer.android.com/guide/developing/device.html State of Colorado Office of Cyber Security
  • 21. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Android UI State of Colorado Office of Cyber Security
  • 22. Android UI CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  As mentioned earlier, XUL can be used to define the Android UI, instead of programmatic code like the previous TextView class.  Let’s look an example of XUL, using DroidDraw from http://droiddraw.org/ we can draw a UI and generate the XML: State of Colorado Office of Cyber Security
  • 23. Droid Draw CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Showing TextView in DroidDraw: State of Colorado Office of Cyber Security
  • 24. The View CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  The are several components to the UI.  One component is the View. TextView is derived from View.  The View class represents the basic building block for the interface components. http://developer.android.com/reference/android/view/View.html  The View can be part of ViewGroup, and needs to have defined layout http://developer.android.com/guide/topics/ui/index.html  A Layout will define how the View will display its objects, or widgets, http://developer.android.com/guide/topics/ui/layout-objects.html  The layout is the architecture for the UI in an Activity. It will define how the elements appear to the user, http://developer.android.com/guide/topics/ui/declaring-layout.html State of Colorado Office of Cyber Security
  • 25. Hello, Views CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  http://developer.android.com/resources/tutorials/views/index.html contains a collection of different “Hello World” tutorials in various layouts.  An example is the Grid View, which displays items in a two- dimensional, scrollable grid. http://developer.android.com/resources/tutorials/views/hello-gridview.html  Others include Linear Layouts, Relatove Layout, Table Layout, Tab Layout, and List Views.  There are also tutorials for widgets like Date Picker, Time Picker, Google Maps, Web View, Gallery, Spinner, Form Stuff and Auto Complete. State of Colorado Office of Cyber Security
  • 26. Droid Draw CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Using Droid Draw to display a Table Layout with a GridView and Radio Buttons: State of Colorado Office of Cyber Security
  • 27. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE The Emulator State of Colorado Office of Cyber Security
  • 28. The Emulator CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Using the Emulator http://developer.android.com/guide/developing/devices/emulator.html  There are several ways to interface to the Emulator, DDMS, ADB, and telnet. State of Colorado Office of Cyber Security
  • 29. Package Browser CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Menu->Package Browser State of Colorado Office of Cyber Security
  • 30. Telnetting CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Telnet from the local machine “telnet localhost 5554”: “help” for the commands: State of Colorado Office of Cyber Security
  • 31. Make a call through telnet CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  “gsm call 3031234” : State of Colorado Office of Cyber Security
  • 32. DDMS CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  The Eclipse DDMS can attach to a running emulator (Start Eclipse first), and just explore the files: State of Colorado Office of Cyber Security
  • 33. DDMS call CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Make a call through DDMS, http://developer.android.com/guide/developing/debugging/ddms.html : State of Colorado Office of Cyber Security
  • 34. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE WebView and WebKit State of Colorado Office of Cyber Security
  • 35. Webkit.WebView CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Adding items to the Screen Menu http://developer.android.com/resources/faq/commontasks.html#filelist State of Colorado Office of Cyber Security
  • 36. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE SQLite State of Colorado Office of Cyber Security
  • 37. SQLite CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Android comes preconfigured with a embedded version of SQLite, http://www.sqlite.org/  There are several GUI tools that can be used to administrate SQLite database, included http://sqliteman.com/ the GUI for SQLite 3.  The database itself can be examined through adb as a remote shell http://developer.android.com/guide/developing/tools/adb.html#sqlite  The Notepad Tutorial , Exercise 1, uses SQLite to store notes http://developer.android.com/resources/tutorials/notepad/notepad-ex1.html State of Colorado Office of Cyber Security
  • 38. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Debugging State of Colorado Office of Cyber Security
  • 39. Debugging CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Debugging information can be found at http://developer.android.com/guide/developing/debugging/index.html  Android is shipped with the Dalvik Debug Monitor Server (DDMS), which provides port-facing services, screen capture on the device, thread and heap information, logcat, and much more. http://developer.android.com/guide/developing/debugging/ddms.html  Android Debug Bridge (adb) is a versatile command line tool that lets you communicate with an emulator instance or connected Android-powered device. http://developer.android.com/guide/developing/tools/adb.html TraceView is a graphical viewer for execution logs that you create using the Debug class to log tracing information in your code. http://developer.android.com/guide/developing/debugging/debugging-tracing State of Colorado Office of Cyber Security
  • 40. DDMS CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  From Eclipse, select Windows->Open Perspective->Other -> DDMS: State of Colorado Office of Cyber Security
  • 41. DDMS CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE State of Colorado Office of Cyber Security
  • 42. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE ADB State of Colorado Office of Cyber Security
  • 43. ADB CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  The Android Debug Bridge (ADB), http://developer.android.com/guide/developing/tools/adb.html State of Colorado Office of Cyber Security
  • 44. ADB Shell CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  ADB can run a shell into the emulator, or remote device, here’s the databases, “ls –R /data/data/*/databases” : State of Colorado Office of Cyber Security
  • 45. ADB install CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Installing APK applications, “abd –s emulator-554 install” : State of Colorado Office of Cyber Security
  • 46. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Android Notepad Tutorial State of Colorado Office of Cyber Security
  • 47. Android Tutorial CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  There is a popular tutorial to walk the programmer through many of the features of Android called the Notepad Tutorial, http://developer.android.com/resources/tutorials/notepad/index.html  State of Colorado Office of Cyber Security