SlideShare a Scribd company logo
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                           Android (Java)
                                                      First Steps
                                                          (By Rich Helton)
                                                              Android (Rev 1)

                                                               State of Colorado
                                                            Office of Cyber Security

                                                                                                                                        State of Colorado Office of Cyber Security
Android
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         From http://en.wikipedia.org/wiki/Android_(operating_system),
         Android is a software stack for mobile devices that includes an
        operating system, middleware and key applications.
         Androids mobile operating system is based on the Linux kernel.
         The Android open-source software stack consists of Java
        applications running on a Java-based, object-oriented application
        framework on top of Java core libraries running on a Dalvik virtual
        machine JIT compilation.
         To me, Android is a Java framework with many underlying C
        libraries that run in an embedded Linux environment. As an
        embedded system, there are many performance and memory
        constraints based on hardware of a mobile device.



                                                                                                                                        State of Colorado Office of Cyber Security
Android pieces
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         For Database work, Android comes with a stripped down database
        server called SQLite, which is an embedded relational database
        management system. http://en.wikipedia.org/wiki/SQLite and
        www.sqlite.org
         For Animation, OpenGL ES (Embedded Systems), is used for 3D
        and 2D graphics applications,
        http://en.wikipedia.org/wiki/OpenGL_ES
         For the Android User Interface, the system uses a comparable RIA
        interface using the XML User Interface Language (XUL).
         There are many other packages that will be discussed later,
        including the REST interface for WebServices, Telephony API,
        Search API, Google Maps and more.




                                                                                                                                        State of Colorado Office of Cyber Security
Android Manifest
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         The Android Manifest file is an XML file that will define your
        Android application’s resources. It is similar to a J2EE web.xml file.
         Every Android application has one that will define many pieces to
        your application including images, permissions, UI pieces, and much
        more.
         See
        http://developer.android.com/guide/topics/manifest/manifest-intro.html




                                                                                                                                        State of Colorado Office of Cyber Security
Android Manifest
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         A sample manifest file in Eclipse:




                                                                                                                                        State of Colorado Office of Cyber Security
Android APK
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         Android will compile its project, including the manifest, into a APK
        file to run on the device, see
        http://en.wikipedia.org/wiki/APK_(file_format)




                                                                                                                                        State of Colorado Office of Cyber Security
Technical Resources
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         Various Sample applications can be found at
        http://developer.android.com/resources/browser.html?tag=sample
         A resource of Common tasks and how to do them in Android
        http://developer.android.com/resources/faq/commontasks.html such
        as displaying Alert Dialogs or Handling UI Events.




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   Android Development




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE



         To start Android development, the Java Development Kit needs to
        be installed locally. Depending on the local development environment
        will dictate which JDK to use.
         After installing the JDK, you should install the Eclipse IDE, the most
        popular cross platform IDE for Java development,
        http://en.wikipedia.org/wiki/Eclipse_(software)
         I like to use the Helios Eclipse for Java Developers
        http://www.eclipse.org/downloads/
         Installing the SDK can be found at
        http://developer.android.com/sdk/installing.html




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         After installing Helios, the Android Development Toolkit can be
        installed as a plugin by using the the Help Menu-> Install New
        Software and Add https://dl-ssl.google.com/android/eclipse :




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Instead of using the Eclipse IDE, command line development can
        be done using the Android Software Development Kit (SDK).
         The SDK can be installed, or downloaded, from
        http://developer.android.com/sdk/index.html
         After installation, you will have a Android SDK and AVD Manager to
        manage the build packages and virtual devices:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

        The Eclipse IDE needs to point to the Android SDK packages, using
        Windows->Preferences->Android:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Virtual Device (AVD)
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

        An AVD will have to be created for debugging, this is your target
        device,
        http://developer.android.com/resources/tutorials/hello-world.html




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Let’s start a New Android in Eclipse, File -> New->Project,
        http://developer.android.com/guide/developing/projects/projects-eclipse.html
        :




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         A basic “HelloWorld” project:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         A basic “HelloWorld” project in just the SDK, no Eclipse, from the
        SDK command line:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Create some code, like showing a TextView with “Hello World”:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Select Run-Run, select “Android Application” and wait for the
        emulator to start:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Development
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         It prints:




                                                                                                                                        State of Colorado Office of Cyber Security
Android Emulator
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         In order to debug/run an Android application, a Android emulator,
        to simulate a virtual phone will need to be set up through the ADT.
        See
        http://developer.android.com/guide/developing/tools/emulator.html
         A hardware device can also be used,
        http://developer.android.com/guide/developing/device.html




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   Android UI




                                                                                                                                        State of Colorado Office of Cyber Security
Android UI
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           As mentioned earlier, XUL can be used to define the Android UI,
          instead of programmatic code like the previous TextView class.
           Let’s look an example of XUL, using DroidDraw from
          http://droiddraw.org/ we can draw a UI and generate the XML:




                                                                                                                                        State of Colorado Office of Cyber Security
Droid Draw
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           Showing TextView in DroidDraw:




                                                                                                                                        State of Colorado Office of Cyber Security
The View
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         The are several components to the UI.
         One component is the View. TextView is derived from View.
         The View class represents the basic building block for the interface
        components.
        http://developer.android.com/reference/android/view/View.html
         The View can be part of ViewGroup, and needs to have defined
        layout http://developer.android.com/guide/topics/ui/index.html
         A Layout will define how the View will display its objects, or
        widgets,
        http://developer.android.com/guide/topics/ui/layout-objects.html
         The layout is the architecture for the UI in an Activity. It will define
        how the elements appear to the user,
        http://developer.android.com/guide/topics/ui/declaring-layout.html



                                                                                                                                        State of Colorado Office of Cyber Security
Hello, Views
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         http://developer.android.com/resources/tutorials/views/index.html
        contains a collection of different “Hello World” tutorials in various
        layouts.
         An example is the Grid View, which displays items in a two-
        dimensional, scrollable grid.
        http://developer.android.com/resources/tutorials/views/hello-gridview.html
         Others include Linear Layouts, Relatove Layout, Table Layout,
        Tab Layout, and List Views.
         There are also tutorials for widgets like Date Picker, Time Picker,
        Google Maps, Web View, Gallery, Spinner, Form Stuff and Auto
        Complete.




                                                                                                                                        State of Colorado Office of Cyber Security
Droid Draw
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Using Droid Draw to display a Table Layout with a GridView and
        Radio Buttons:




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   The Emulator




                                                                                                                                        State of Colorado Office of Cyber Security
The Emulator
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Using the Emulator
        http://developer.android.com/guide/developing/devices/emulator.html
         There are several ways to interface to the Emulator, DDMS, ADB,
        and telnet.




                                                                                                                                        State of Colorado Office of Cyber Security
Package Browser
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Menu->Package Browser




                                                                                                                                        State of Colorado Office of Cyber Security
Telnetting
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Telnet from the local machine “telnet localhost 5554”:




        “help” for the commands:




                                                                                                                                        State of Colorado Office of Cyber Security
Make a call through telnet
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         “gsm call 3031234” :




                                                                                                                                        State of Colorado Office of Cyber Security
DDMS
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         The Eclipse DDMS can attach to a running emulator (Start Eclipse
        first), and just explore the files:




                                                                                                                                        State of Colorado Office of Cyber Security
DDMS call
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Make a call through DDMS,
        http://developer.android.com/guide/developing/debugging/ddms.html :




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   WebView and WebKit




                                                                                                                                        State of Colorado Office of Cyber Security
Webkit.WebView
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE

         Adding items to the Screen Menu
        http://developer.android.com/resources/faq/commontasks.html#filelist




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   SQLite




                                                                                                                                        State of Colorado Office of Cyber Security
SQLite
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           Android comes preconfigured with a embedded version of SQLite,
          http://www.sqlite.org/
           There are several GUI tools that can be used to administrate
          SQLite database, included http://sqliteman.com/ the GUI for SQLite 3.
           The database itself can be examined through adb as a remote shell
          http://developer.android.com/guide/developing/tools/adb.html#sqlite
           The Notepad Tutorial , Exercise 1, uses SQLite to store notes
          http://developer.android.com/resources/tutorials/notepad/notepad-ex1.html




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   Debugging




                                                                                                                                        State of Colorado Office of Cyber Security
Debugging
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           Debugging information can be found at
          http://developer.android.com/guide/developing/debugging/index.html
           Android is shipped with the Dalvik Debug Monitor Server (DDMS),
          which provides port-facing services, screen capture on the device,
          thread and heap information, logcat, and much more.
          http://developer.android.com/guide/developing/debugging/ddms.html
           Android Debug Bridge (adb) is a versatile command line tool that
          lets you communicate with an emulator instance or connected
          Android-powered device.
          http://developer.android.com/guide/developing/tools/adb.html
          TraceView is a graphical viewer for execution logs that you create
          using the Debug class to log tracing information in your code.
          http://developer.android.com/guide/developing/debugging/debugging-tracing




                                                                                                                                        State of Colorado Office of Cyber Security
DDMS
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           From Eclipse, select Windows->Open Perspective->Other ->
          DDMS:




                                                                                                                                        State of Colorado Office of Cyber Security
DDMS
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   ADB




                                                                                                                                        State of Colorado Office of Cyber Security
ADB
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           The Android Debug Bridge (ADB),
          http://developer.android.com/guide/developing/tools/adb.html




                                                                                                                                        State of Colorado Office of Cyber Security
ADB Shell
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           ADB can run a shell into the emulator, or remote device, here’s the
          databases, “ls –R /data/data/*/databases” :




                                                                                                                                        State of Colorado Office of Cyber Security
ADB install
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
          Installing APK applications, “abd –s emulator-554 install” :




                                                                                                                                        State of Colorado Office of Cyber Security
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE




                                   Android Notepad
                                   Tutorial


                                                                                                                                        State of Colorado Office of Cyber Security
Android Tutorial
CYBER SECURITY   INFORMATION TECHNOLOGY   CRITICAL INFRASTRUCTURE   HOMELAND SECURITY   MULTI-USER NETWORK CYBER SECURITY   INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE
           There is a popular tutorial to walk the programmer through many of
          the features of Android called the Notepad Tutorial,
          http://developer.android.com/resources/tutorials/notepad/index.html
          




                                                                                                                                        State of Colorado Office of Cyber Security

More Related Content

What's hot (20)

Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentestingNull Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Romansh Yadav
 
Mobile security part 2
Mobile security part 2Mobile security part 2
Mobile security part 2
Romansh Yadav
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthinkspa
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android Applications
BlrDroid
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
Sperasoft
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applications
Jose Manuel Ortega Candel
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
OWASP
 
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - Whitepaper
Ajin Abraham
 
Help Doctor, my application is an onion!
Help Doctor, my application is an onion!Help Doctor, my application is an onion!
Help Doctor, my application is an onion!
Sebastián Guerrero Selma
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
Anusha Chavan
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
Asanka Dilruk
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
Mobile security
Mobile securityMobile security
Mobile security
Stefaan
 
Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)
Prathan Phongthiproek
 
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
.NET MALWARE THREATS -- BHACK CONFERENCE 2019.NET MALWARE THREATS -- BHACK CONFERENCE 2019
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
Alexandre Borges
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applications
h4oxer
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
Stephan Chenette
 
Bypassing the Android Permission Model
Bypassing the Android Permission ModelBypassing the Android Permission Model
Bypassing the Android Permission Model
Georgia Weidman
 
Android Security
Android SecurityAndroid Security
Android Security
Suminda Gunawardhana
 
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentestingNull Dubai Humla_Romansh_Yadav_Android_app_pentesting
Null Dubai Humla_Romansh_Yadav_Android_app_pentesting
Romansh Yadav
 
Mobile security part 2
Mobile security part 2Mobile security part 2
Mobile security part 2
Romansh Yadav
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthinkspa
 
Android Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android ApplicationsAndroid Security - Common Security Pitfalls in Android Applications
Android Security - Common Security Pitfalls in Android Applications
BlrDroid
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
Sperasoft
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
OWASP
 
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - Whitepaper
Ajin Abraham
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
Asanka Dilruk
 
Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013Building Custom Android Malware BruCON 2013
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
Mobile security
Mobile securityMobile security
Mobile security
Stefaan
 
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
.NET MALWARE THREATS -- BHACK CONFERENCE 2019.NET MALWARE THREATS -- BHACK CONFERENCE 2019
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
Alexandre Borges
 
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applications
h4oxer
 
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
2013 Toorcon San Diego Building Custom Android Malware for Penetration Testing
Stephan Chenette
 
Bypassing the Android Permission Model
Bypassing the Android Permission ModelBypassing the Android Permission Model
Bypassing the Android Permission Model
Georgia Weidman
 

Viewers also liked (20)

Android Development: The Basics
Android Development: The BasicsAndroid Development: The Basics
Android Development: The Basics
Mike Desjardins
 
Introduction to java
Introduction to javaIntroduction to java
Introduction to java
Veerabadra Badra
 
Java tutorial PPT
Java tutorial PPTJava tutorial PPT
Java tutorial PPT
Intelligo Technologies
 
Modul oop with java application mauludin
Modul oop with java application   mauludinModul oop with java application   mauludin
Modul oop with java application mauludin
Mauludin Ahmad
 
The Game Of Life - Java‘s Siblings and Heirs are populating the Ecosystem
The Game Of Life - Java‘s Siblings and Heirs are populating  the EcosystemThe Game Of Life - Java‘s Siblings and Heirs are populating  the Ecosystem
The Game Of Life - Java‘s Siblings and Heirs are populating the Ecosystem
jexp
 
KC Java Android Talk (March 2011)
KC Java Android Talk (March 2011)KC Java Android Talk (March 2011)
KC Java Android Talk (March 2011)
osake
 
GUI Programming with Java
GUI Programming with JavaGUI Programming with Java
GUI Programming with Java
Jussi Pohjolainen
 
Gu iintro(java)
Gu iintro(java)Gu iintro(java)
Gu iintro(java)
Satish Verma
 
Introduction to Android Development
Introduction to Android DevelopmentIntroduction to Android Development
Introduction to Android Development
Prof. Erwin Globio
 
Google I/O 2013 報告会 Android Studio と Gradle
Google I/O 2013 報告会 Android Studio と GradleGoogle I/O 2013 報告会 Android Studio と Gradle
Google I/O 2013 報告会 Android Studio と Gradle
Keishin Yokomaku
 
OOP in Java
OOP in JavaOOP in Java
OOP in Java
wiradikusuma
 
Games and Java ME - Have fun and earn some money
Games and Java ME - Have fun and earn some moneyGames and Java ME - Have fun and earn some money
Games and Java ME - Have fun and earn some money
Marcelo Quinta
 
Practical OOP In Java
Practical OOP In JavaPractical OOP In Java
Practical OOP In Java
wiradikusuma
 
java swing
java swingjava swing
java swing
vannarith
 
Fundamental of android
Fundamental of androidFundamental of android
Fundamental of android
Adarsh Patel
 
Workshop on android ui
Workshop on android uiWorkshop on android ui
Workshop on android ui
Adarsh Patel
 
Java for android developers
Java for android developersJava for android developers
Java for android developers
Aly Abdelkareem
 
Android Programming
Android ProgrammingAndroid Programming
Android Programming
Pasi Manninen
 
Basic java for Android Developer
Basic java for Android DeveloperBasic java for Android Developer
Basic java for Android Developer
Nattapong Tonprasert
 
Introduction to Android and Android Studio
Introduction to Android and Android StudioIntroduction to Android and Android Studio
Introduction to Android and Android Studio
Suyash Srijan
 
Android Development: The Basics
Android Development: The BasicsAndroid Development: The Basics
Android Development: The Basics
Mike Desjardins
 
Modul oop with java application mauludin
Modul oop with java application   mauludinModul oop with java application   mauludin
Modul oop with java application mauludin
Mauludin Ahmad
 
The Game Of Life - Java‘s Siblings and Heirs are populating the Ecosystem
The Game Of Life - Java‘s Siblings and Heirs are populating  the EcosystemThe Game Of Life - Java‘s Siblings and Heirs are populating  the Ecosystem
The Game Of Life - Java‘s Siblings and Heirs are populating the Ecosystem
jexp
 
KC Java Android Talk (March 2011)
KC Java Android Talk (March 2011)KC Java Android Talk (March 2011)
KC Java Android Talk (March 2011)
osake
 
Introduction to Android Development
Introduction to Android DevelopmentIntroduction to Android Development
Introduction to Android Development
Prof. Erwin Globio
 
Google I/O 2013 報告会 Android Studio と Gradle
Google I/O 2013 報告会 Android Studio と GradleGoogle I/O 2013 報告会 Android Studio と Gradle
Google I/O 2013 報告会 Android Studio と Gradle
Keishin Yokomaku
 
Games and Java ME - Have fun and earn some money
Games and Java ME - Have fun and earn some moneyGames and Java ME - Have fun and earn some money
Games and Java ME - Have fun and earn some money
Marcelo Quinta
 
Practical OOP In Java
Practical OOP In JavaPractical OOP In Java
Practical OOP In Java
wiradikusuma
 
Fundamental of android
Fundamental of androidFundamental of android
Fundamental of android
Adarsh Patel
 
Workshop on android ui
Workshop on android uiWorkshop on android ui
Workshop on android ui
Adarsh Patel
 
Java for android developers
Java for android developersJava for android developers
Java for android developers
Aly Abdelkareem
 
Introduction to Android and Android Studio
Introduction to Android and Android StudioIntroduction to Android and Android Studio
Introduction to Android and Android Studio
Suyash Srijan
 

Similar to First Steps in Android (20)

Intro to Mobile app development Android.pptx
Intro to Mobile app development Android.pptxIntro to Mobile app development Android.pptx
Intro to Mobile app development Android.pptx
itstehreem2830
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
Nilay Mishra
 
Android ppt
Android pptAndroid ppt
Android ppt
Gateway Software Solutions
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
n|u - The Open Security Community
 
A case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsA case study of malware detection and removal in android apps
A case study of malware detection and removal in android apps
ijmnct
 
From Reversing to Exploitation
From Reversing to ExploitationFrom Reversing to Exploitation
From Reversing to Exploitation
Satria Ady Pradana
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
amitgb
 
Securing Android Applications
Securing Android ApplicationsSecuring Android Applications
Securing Android Applications
Infosys
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, android
Jehad2012
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
Minali Arora
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Mobile Application Development-Lecture 03 & 04.pdf
Mobile Application Development-Lecture 03 & 04.pdfMobile Application Development-Lecture 03 & 04.pdf
Mobile Application Development-Lecture 03 & 04.pdf
AbdullahMunir32
 
Cc4201519521
Cc4201519521Cc4201519521
Cc4201519521
IJERA Editor
 
20IT601PE - Mobile Application Development PPT.pdf
20IT601PE - Mobile Application Development PPT.pdf20IT601PE - Mobile Application Development PPT.pdf
20IT601PE - Mobile Application Development PPT.pdf
vani15332
 
Android security
Android securityAndroid security
Android security
Dr Amira Bibo
 
Android security
Android securityAndroid security
Android security
Dr Amira Bibo
 
Slides bootcamp21
Slides bootcamp21Slides bootcamp21
Slides bootcamp21
dxsaki
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
Sergey Kochergan
 
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceFrom Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in Essence
Satria Ady Pradana
 
Android apps
Android appsAndroid apps
Android apps
SEO Web Services
 
Intro to Mobile app development Android.pptx
Intro to Mobile app development Android.pptxIntro to Mobile app development Android.pptx
Intro to Mobile app development Android.pptx
itstehreem2830
 
Android System Design And Power Management
Android System Design And Power ManagementAndroid System Design And Power Management
Android System Design And Power Management
Nilay Mishra
 
A case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsA case study of malware detection and removal in android apps
A case study of malware detection and removal in android apps
ijmnct
 
From Reversing to Exploitation
From Reversing to ExploitationFrom Reversing to Exploitation
From Reversing to Exploitation
Satria Ady Pradana
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
amitgb
 
Securing Android Applications
Securing Android ApplicationsSecuring Android Applications
Securing Android Applications
Infosys
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, android
Jehad2012
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
Minali Arora
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Mobile Application Development-Lecture 03 & 04.pdf
Mobile Application Development-Lecture 03 & 04.pdfMobile Application Development-Lecture 03 & 04.pdf
Mobile Application Development-Lecture 03 & 04.pdf
AbdullahMunir32
 
20IT601PE - Mobile Application Development PPT.pdf
20IT601PE - Mobile Application Development PPT.pdf20IT601PE - Mobile Application Development PPT.pdf
20IT601PE - Mobile Application Development PPT.pdf
vani15332
 
Slides bootcamp21
Slides bootcamp21Slides bootcamp21
Slides bootcamp21
dxsaki
 
From Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in EssenceFrom Reversing to Exploitation: Android Application Security in Essence
From Reversing to Exploitation: Android Application Security in Essence
Satria Ady Pradana
 

More from Rich Helton (20)

Java for Mainframers
Java for MainframersJava for Mainframers
Java for Mainframers
Rich Helton
 
I pad uicatalog_lesson02
I pad uicatalog_lesson02I pad uicatalog_lesson02
I pad uicatalog_lesson02
Rich Helton
 
Mongo db rev001.
Mongo db rev001.Mongo db rev001.
Mongo db rev001.
Rich Helton
 
NServicebus WCF Integration 101
NServicebus WCF Integration 101NServicebus WCF Integration 101
NServicebus WCF Integration 101
Rich Helton
 
AspMVC4 start101
AspMVC4 start101AspMVC4 start101
AspMVC4 start101
Rich Helton
 
Entity frameworks101
Entity frameworks101Entity frameworks101
Entity frameworks101
Rich Helton
 
Tumbleweed intro
Tumbleweed introTumbleweed intro
Tumbleweed intro
Rich Helton
 
Azure rev002
Azure rev002Azure rev002
Azure rev002
Rich Helton
 
Salesforce Intro
Salesforce IntroSalesforce Intro
Salesforce Intro
Rich Helton
 
LEARNING  iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
LEARNING	 iPAD STORYBOARDS IN OBJ-­‐C LESSON 1LEARNING	 iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
LEARNING  iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
Rich Helton
 
Learning C# iPad Programming
Learning C# iPad ProgrammingLearning C# iPad Programming
Learning C# iPad Programming
Rich Helton
 
NServiceBus
NServiceBusNServiceBus
NServiceBus
Rich Helton
 
Overview of CSharp MVC3 and EF4
Overview of CSharp MVC3 and EF4Overview of CSharp MVC3 and EF4
Overview of CSharp MVC3 and EF4
Rich Helton
 
Adobe Flex4
Adobe Flex4 Adobe Flex4
Adobe Flex4
Rich Helton
 
C#Web Sec Oct27 2010 Final
C#Web Sec Oct27 2010 FinalC#Web Sec Oct27 2010 Final
C#Web Sec Oct27 2010 Final
Rich Helton
 
Jira Rev002
Jira Rev002Jira Rev002
Jira Rev002
Rich Helton
 
Sql Injection and Entity Frameworks
Sql Injection and Entity FrameworksSql Injection and Entity Frameworks
Sql Injection and Entity Frameworks
Rich Helton
 
C# Security Testing and Debugging
C# Security Testing and DebuggingC# Security Testing and Debugging
C# Security Testing and Debugging
Rich Helton
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall intro
Rich Helton
 
Java Web Security Class
Java Web Security ClassJava Web Security Class
Java Web Security Class
Rich Helton
 
Java for Mainframers
Java for MainframersJava for Mainframers
Java for Mainframers
Rich Helton
 
I pad uicatalog_lesson02
I pad uicatalog_lesson02I pad uicatalog_lesson02
I pad uicatalog_lesson02
Rich Helton
 
Mongo db rev001.
Mongo db rev001.Mongo db rev001.
Mongo db rev001.
Rich Helton
 
NServicebus WCF Integration 101
NServicebus WCF Integration 101NServicebus WCF Integration 101
NServicebus WCF Integration 101
Rich Helton
 
AspMVC4 start101
AspMVC4 start101AspMVC4 start101
AspMVC4 start101
Rich Helton
 
Entity frameworks101
Entity frameworks101Entity frameworks101
Entity frameworks101
Rich Helton
 
Tumbleweed intro
Tumbleweed introTumbleweed intro
Tumbleweed intro
Rich Helton
 
Salesforce Intro
Salesforce IntroSalesforce Intro
Salesforce Intro
Rich Helton
 
LEARNING  iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
LEARNING	 iPAD STORYBOARDS IN OBJ-­‐C LESSON 1LEARNING	 iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
LEARNING  iPAD STORYBOARDS IN OBJ-­‐C LESSON 1
Rich Helton
 
Learning C# iPad Programming
Learning C# iPad ProgrammingLearning C# iPad Programming
Learning C# iPad Programming
Rich Helton
 
Overview of CSharp MVC3 and EF4
Overview of CSharp MVC3 and EF4Overview of CSharp MVC3 and EF4
Overview of CSharp MVC3 and EF4
Rich Helton
 
C#Web Sec Oct27 2010 Final
C#Web Sec Oct27 2010 FinalC#Web Sec Oct27 2010 Final
C#Web Sec Oct27 2010 Final
Rich Helton
 
Sql Injection and Entity Frameworks
Sql Injection and Entity FrameworksSql Injection and Entity Frameworks
Sql Injection and Entity Frameworks
Rich Helton
 
C# Security Testing and Debugging
C# Security Testing and DebuggingC# Security Testing and Debugging
C# Security Testing and Debugging
Rich Helton
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall intro
Rich Helton
 
Java Web Security Class
Java Web Security ClassJava Web Security Class
Java Web Security Class
Rich Helton
 

Recently uploaded (20)

HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 

First Steps in Android

  • 1. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Android (Java) First Steps (By Rich Helton) Android (Rev 1) State of Colorado Office of Cyber Security State of Colorado Office of Cyber Security
  • 2. Android CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  From http://en.wikipedia.org/wiki/Android_(operating_system),  Android is a software stack for mobile devices that includes an operating system, middleware and key applications.  Androids mobile operating system is based on the Linux kernel.  The Android open-source software stack consists of Java applications running on a Java-based, object-oriented application framework on top of Java core libraries running on a Dalvik virtual machine JIT compilation.  To me, Android is a Java framework with many underlying C libraries that run in an embedded Linux environment. As an embedded system, there are many performance and memory constraints based on hardware of a mobile device. State of Colorado Office of Cyber Security
  • 3. Android pieces CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  For Database work, Android comes with a stripped down database server called SQLite, which is an embedded relational database management system. http://en.wikipedia.org/wiki/SQLite and www.sqlite.org  For Animation, OpenGL ES (Embedded Systems), is used for 3D and 2D graphics applications, http://en.wikipedia.org/wiki/OpenGL_ES  For the Android User Interface, the system uses a comparable RIA interface using the XML User Interface Language (XUL).  There are many other packages that will be discussed later, including the REST interface for WebServices, Telephony API, Search API, Google Maps and more. State of Colorado Office of Cyber Security
  • 4. Android Manifest CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  The Android Manifest file is an XML file that will define your Android application’s resources. It is similar to a J2EE web.xml file.  Every Android application has one that will define many pieces to your application including images, permissions, UI pieces, and much more.  See http://developer.android.com/guide/topics/manifest/manifest-intro.html State of Colorado Office of Cyber Security
  • 5. Android Manifest CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  A sample manifest file in Eclipse: State of Colorado Office of Cyber Security
  • 6. Android APK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Android will compile its project, including the manifest, into a APK file to run on the device, see http://en.wikipedia.org/wiki/APK_(file_format) State of Colorado Office of Cyber Security
  • 7. Technical Resources CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Various Sample applications can be found at http://developer.android.com/resources/browser.html?tag=sample  A resource of Common tasks and how to do them in Android http://developer.android.com/resources/faq/commontasks.html such as displaying Alert Dialogs or Handling UI Events. State of Colorado Office of Cyber Security
  • 8. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Android Development State of Colorado Office of Cyber Security
  • 9. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  To start Android development, the Java Development Kit needs to be installed locally. Depending on the local development environment will dictate which JDK to use.  After installing the JDK, you should install the Eclipse IDE, the most popular cross platform IDE for Java development, http://en.wikipedia.org/wiki/Eclipse_(software)  I like to use the Helios Eclipse for Java Developers http://www.eclipse.org/downloads/  Installing the SDK can be found at http://developer.android.com/sdk/installing.html State of Colorado Office of Cyber Security
  • 10. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  After installing Helios, the Android Development Toolkit can be installed as a plugin by using the the Help Menu-> Install New Software and Add https://dl-ssl.google.com/android/eclipse : State of Colorado Office of Cyber Security
  • 11. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Instead of using the Eclipse IDE, command line development can be done using the Android Software Development Kit (SDK).  The SDK can be installed, or downloaded, from http://developer.android.com/sdk/index.html  After installation, you will have a Android SDK and AVD Manager to manage the build packages and virtual devices: State of Colorado Office of Cyber Security
  • 12. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE The Eclipse IDE needs to point to the Android SDK packages, using Windows->Preferences->Android: State of Colorado Office of Cyber Security
  • 13. Android Virtual Device (AVD) CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE An AVD will have to be created for debugging, this is your target device, http://developer.android.com/resources/tutorials/hello-world.html State of Colorado Office of Cyber Security
  • 14. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Let’s start a New Android in Eclipse, File -> New->Project, http://developer.android.com/guide/developing/projects/projects-eclipse.html : State of Colorado Office of Cyber Security
  • 15. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  A basic “HelloWorld” project: State of Colorado Office of Cyber Security
  • 16. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  A basic “HelloWorld” project in just the SDK, no Eclipse, from the SDK command line: State of Colorado Office of Cyber Security
  • 17. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Create some code, like showing a TextView with “Hello World”: State of Colorado Office of Cyber Security
  • 18. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Select Run-Run, select “Android Application” and wait for the emulator to start: State of Colorado Office of Cyber Security
  • 19. Android Development CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  It prints: State of Colorado Office of Cyber Security
  • 20. Android Emulator CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  In order to debug/run an Android application, a Android emulator, to simulate a virtual phone will need to be set up through the ADT. See http://developer.android.com/guide/developing/tools/emulator.html  A hardware device can also be used, http://developer.android.com/guide/developing/device.html State of Colorado Office of Cyber Security
  • 21. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Android UI State of Colorado Office of Cyber Security
  • 22. Android UI CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  As mentioned earlier, XUL can be used to define the Android UI, instead of programmatic code like the previous TextView class.  Let’s look an example of XUL, using DroidDraw from http://droiddraw.org/ we can draw a UI and generate the XML: State of Colorado Office of Cyber Security
  • 23. Droid Draw CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Showing TextView in DroidDraw: State of Colorado Office of Cyber Security
  • 24. The View CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  The are several components to the UI.  One component is the View. TextView is derived from View.  The View class represents the basic building block for the interface components. http://developer.android.com/reference/android/view/View.html  The View can be part of ViewGroup, and needs to have defined layout http://developer.android.com/guide/topics/ui/index.html  A Layout will define how the View will display its objects, or widgets, http://developer.android.com/guide/topics/ui/layout-objects.html  The layout is the architecture for the UI in an Activity. It will define how the elements appear to the user, http://developer.android.com/guide/topics/ui/declaring-layout.html State of Colorado Office of Cyber Security
  • 25. Hello, Views CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  http://developer.android.com/resources/tutorials/views/index.html contains a collection of different “Hello World” tutorials in various layouts.  An example is the Grid View, which displays items in a two- dimensional, scrollable grid. http://developer.android.com/resources/tutorials/views/hello-gridview.html  Others include Linear Layouts, Relatove Layout, Table Layout, Tab Layout, and List Views.  There are also tutorials for widgets like Date Picker, Time Picker, Google Maps, Web View, Gallery, Spinner, Form Stuff and Auto Complete. State of Colorado Office of Cyber Security
  • 26. Droid Draw CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Using Droid Draw to display a Table Layout with a GridView and Radio Buttons: State of Colorado Office of Cyber Security
  • 27. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE The Emulator State of Colorado Office of Cyber Security
  • 28. The Emulator CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Using the Emulator http://developer.android.com/guide/developing/devices/emulator.html  There are several ways to interface to the Emulator, DDMS, ADB, and telnet. State of Colorado Office of Cyber Security
  • 29. Package Browser CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Menu->Package Browser State of Colorado Office of Cyber Security
  • 30. Telnetting CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Telnet from the local machine “telnet localhost 5554”: “help” for the commands: State of Colorado Office of Cyber Security
  • 31. Make a call through telnet CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  “gsm call 3031234” : State of Colorado Office of Cyber Security
  • 32. DDMS CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  The Eclipse DDMS can attach to a running emulator (Start Eclipse first), and just explore the files: State of Colorado Office of Cyber Security
  • 33. DDMS call CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Make a call through DDMS, http://developer.android.com/guide/developing/debugging/ddms.html : State of Colorado Office of Cyber Security
  • 34. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE WebView and WebKit State of Colorado Office of Cyber Security
  • 35. Webkit.WebView CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Adding items to the Screen Menu http://developer.android.com/resources/faq/commontasks.html#filelist State of Colorado Office of Cyber Security
  • 36. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE SQLite State of Colorado Office of Cyber Security
  • 37. SQLite CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Android comes preconfigured with a embedded version of SQLite, http://www.sqlite.org/  There are several GUI tools that can be used to administrate SQLite database, included http://sqliteman.com/ the GUI for SQLite 3.  The database itself can be examined through adb as a remote shell http://developer.android.com/guide/developing/tools/adb.html#sqlite  The Notepad Tutorial , Exercise 1, uses SQLite to store notes http://developer.android.com/resources/tutorials/notepad/notepad-ex1.html State of Colorado Office of Cyber Security
  • 38. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Debugging State of Colorado Office of Cyber Security
  • 39. Debugging CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  Debugging information can be found at http://developer.android.com/guide/developing/debugging/index.html  Android is shipped with the Dalvik Debug Monitor Server (DDMS), which provides port-facing services, screen capture on the device, thread and heap information, logcat, and much more. http://developer.android.com/guide/developing/debugging/ddms.html  Android Debug Bridge (adb) is a versatile command line tool that lets you communicate with an emulator instance or connected Android-powered device. http://developer.android.com/guide/developing/tools/adb.html TraceView is a graphical viewer for execution logs that you create using the Debug class to log tracing information in your code. http://developer.android.com/guide/developing/debugging/debugging-tracing State of Colorado Office of Cyber Security
  • 40. DDMS CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  From Eclipse, select Windows->Open Perspective->Other -> DDMS: State of Colorado Office of Cyber Security
  • 41. DDMS CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE State of Colorado Office of Cyber Security
  • 42. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE ADB State of Colorado Office of Cyber Security
  • 43. ADB CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  The Android Debug Bridge (ADB), http://developer.android.com/guide/developing/tools/adb.html State of Colorado Office of Cyber Security
  • 44. ADB Shell CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  ADB can run a shell into the emulator, or remote device, here’s the databases, “ls –R /data/data/*/databases” : State of Colorado Office of Cyber Security
  • 45. ADB install CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Installing APK applications, “abd –s emulator-554 install” : State of Colorado Office of Cyber Security
  • 46. CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE Android Notepad Tutorial State of Colorado Office of Cyber Security
  • 47. Android Tutorial CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE HOMELAND SECURITY MULTI-USER NETWORK CYBER SECURITY INFORMATION TECHNOLOGY CRITICAL INFRASTRUCTURE  There is a popular tutorial to walk the programmer through many of the features of Android called the Notepad Tutorial, http://developer.android.com/resources/tutorials/notepad/index.html  State of Colorado Office of Cyber Security