This document discusses Android security and provides steps for analyzing Android applications and exploiting vulnerabilities. It includes the following: 1) An introduction to Android architecture including sandboxes, application frameworks, and permissions. 2) Reasons for focusing on Android security such as the number of downloads, weak app review processes, and platform update issues. 3) Common Android application vulnerabilities like logging of sensitive data, insecure communication, and vulnerabilities in the WebView like addJavaScriptInterface. 4) Steps for cross-compiling code to run on Android, pushing binaries to an Android device, and exploiting vulnerabilities to pop a remote shell.