IntermediateMobileAppSecPentesting

The Mobile Application Hacker's Handbook

3 / 5

Chell, Erasmus, Colley, and Whitehouse's reference on iOS and Android application security from the early-mid 2010s — runtime hooking, transport security, IPC abuse, and the platform-specific surface of mobile pentesting.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2015
Publisher
Wiley
Pages
816
Language
English

Read this if

Mobile pentesters who want the structural foundations of the discipline — what surface exists, where bugs typically live, how the platforms differ in their defaults. The taxonomy and methodology chapters age more slowly than the specific tooling.

Skip this if

Readers needing current technique on App Attest, DeviceCheck, biometric-bound keys, modern pinning bypass, recent runtime instrumentation (Frida-class), or the cross-platform reality (React Native, Flutter, Capacitor). The 2015 publication shows on every chapter.

Key takeaways

  • The platform-defaults-and-pitfalls structure is durable: each platform's security model is still best understood through the same lens the book uses.
  • IPC, deep-link, and inter-app surface remain the highest-yield mobile attack surfaces, even though the specific APIs have changed.
  • Pair every chapter with current OWASP MASTG / MASVS material; the conceptual map is the book's value, the specific tooling is not.

Notes

Pair with OWASP MASTG, the Frida documentation, and platform-specific resources (Apple Platform Security Guide, Android Security Internals by Elenkov) for current depth. iOS Application Security (Thiel) is a thinner adjacent reference. The book is increasingly historical but still the most coherent printed introduction to mobile-pentest methodology — once you have the methodology, the tools are a search away.