Mobile Part 4
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
>> Hi everyone, welcome back to the course.
00:00
In the last video we talked about things
00:00
like IMEI and ESN.
00:00
Again, I mentioned that's an important section,
00:00
so if you haven't watched that yet,
00:00
pause this video and go
00:00
back and watch the previous video.
00:00
In this video, we're going to talk
00:00
about Android devices,
00:00
so we'll talk about things like the Android architecture.
00:00
Speaking of the Android architecture,
00:00
so we see here that we have the Linux kernel,
00:00
so Android devices are Linux-based.
00:00
If you didn't know that, then we have
00:00
our Android runtime,
00:00
so our DVM or Dalvik Virtual Machine.
00:00
That's been discontinued, but you'll
00:00
want to understand,
00:00
well in newer devices,
00:00
but you'll want to understand that DVM stands for
00:00
Dalvik Virtual Machine and
00:00
understand its Android related.
00:00
We then have our libraries, our application framework,
00:00
and ultimately our applications like URI interact with.
00:00
Things like our browser,
00:00
our contact lists were texting grandma, that stuff.
00:00
We have different Android libraries.
00:00
Things like our media framework,
00:00
which contains like recording or playing back videos,
00:00
SQL lite, cell ES and SGL,
00:00
and you'll want to know that one for your exam.
00:00
That's used to render 2D and 3D graphics.
00:00
FreeType, render bitmap, and vector fonts.
00:00
Webkit, displays webpages as the name implies.
00:00
Libc is a C system library again as the name hints there.
00:00
Then we've also got
00:00
a Core Java that what's provides Java functionalities.
00:00
DVM or Dalvik virtual machine,
00:00
you'll just want to understand it executes
00:00
applications that are written for Android,
00:00
it also controls power management
00:00
, and memory management.
00:00
Again, keep those in mind for your exam as well.
00:00
The Android boot process,
00:00
so what occurs here, and this is a good graphic to use,
00:00
so we've got our boot ROM, boot loader,
00:00
kernel in its zygote and then system servers.
00:00
Just make sure you understand
00:00
where zygote fits in the process for the exam as well.
00:00
Boot ROM is activated then the boot load is loaded
00:00
into RAM than the boot loader
00:00
initializes and starts the kernel.
00:00
The kernel then initializes the different controllers,
00:00
caches and memory protections.
00:00
Then the init process launches,
00:00
and then the zygote it's responsible for
00:00
spinning up new VMs for each app that started.
00:00
Then of course we wrap up with
00:00
a system server as launching as well.
00:00
Breaking Android. How do
00:00
we get into this, and get the data on it?
00:00
One thing we can use to bypass a phone lock,
00:00
and an Android device, so again,
00:00
remember this for your exam.
00:00
Using the Android debug bridge or ADB.
00:00
We can also route Android devices,
00:00
so things like one-click root,
00:00
Kingo Android root, Towelroot, and RescuRoot.
00:00
One key aspect for the exam to keep in mind
00:00
is if it's asking me
00:00
something like jailbreaking or whatever,
00:00
and you see, it's asking on Android devices.
00:00
In most cases, anything with
00:00
root in the name will be correct,
00:00
so you'll notice that Android device jailbreaking,
00:00
a lot of it says root in the name.
00:00
In this video we've talked about the Android devices,
00:00
we talked about Android architecture,
00:00
and also ways different tools we can
00:00
use to jailbreak Android devices.
00:00
The next video we're going to talk about Apple iOS.
Up Next
Instructed By
Similar Content