1.10 Android Knowledge Check

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

3 hours 58 minutes
Video Transcription
so much like jail breaking. Ruling your android devices the process of running your device with super user privileges. The Super User account is called root, hence the name routing. There's many reasons the user may want to root their device. Umm, maybe they want to remove preinstalled applications
or maybe perform research by loading their own Colonel's etcetera.
But if we aren't careful, routing a device could be dangerous. This is because all the data and the applications air exposed due to them being granted route permissions.
This could leave the door open to a malicious user extracting information from the device. Also like jail breaking the routing process is gonna take advantage of a vulnerability in the Lenox Colonel Abou process.
Now, in this course, we aren't going to actually ruin android device.
Yes, yes, I know you're disappointed, but for the purposes of the course, the software emulators that we have for android like the android I d. E and S T K's those already give us root access so we can perform any action we choose. Justus, if we were running route on a device of our own,
All right, Well, as we're all wrapped up, here with module one. Let's take a few moments and test what we've learned about Android with the brief knowledge check. Let's go ahead, pause a video, take a few minutes of the questions, then come back and we'll take a look at the answers together. All right, so we're back. I hope you had sufficient time to answer those questions.
Hope you don't have a problem with, um I minded. Threw in some gimmes. So let's go over the answers together.
Our question one And what layer of the android applications installed? Yes, the application layer. So the application layer holds the applications that user old style and also holds the applications default installed by the operating system. Okay, What organization helped develop Android?
The open handset alliance? That would be 84 developers and manufacturers and Google together launched their commercial device.
Okay, Androids Colonel's based on the limits. Colonel.
In what language are android applications were in, typically Java. Of course, there's go in Copeland Copeland, and you can write it in native code as well. So it supports all of those. Okay, what file must an a P. K archive include to run?
That's right. The android manifest file. Now this gets generated by the I t. E. So you don't worry about putting it in, but it is in there. Okay, Next one is what is a content provider? Well, a content provider is a day of storage container. It's a data storage container within the application. And when an another application needs the data from
a storage container, it uses the content provider.
Okay, what is an activity? Well, in activity is part of the U I. So when the user is interacting with the screen there, interacting with activities all right, next one processes running their own sandbox. Yep, that's right. Processes and applications.
They all run in their own sandbox. We've talked about that. Threw out the android portion of the module.
Okay, what is an intent? Pretty simple. It's a messaging object. Whenever an application intends to do something, it uses an intent.
All right. Last question. Where are Dex? Files executed.
They are executed in the dabbling virtual machine and the android runtime environment.
In her first module, we examined the holm our landscape and looked at some mobile risks. We then became familiar with the IOS and android platforms and finally we examine the applications of both architecture's so we can better analyze these applications effectively
Up Next
Mobile Malware Analysis Fundamentals

In the Mobile Malware Analysis Fundamentals course, participants will obtain the knowledge and skills to perform basic malware analysis on mobile devices. Participants will perform these tasks by learning and implementing tools and techniques while examining malicious programs.

Instructed By