Black Hat USA 2015: Pentest in Miniature
The explosive growth of mobile computing has profoundly changed the security landscape, and shows no sign of stopping. Today's trio of Black Hat USA 2015 Training highlights all focus on the details of exploiting this pocket-borne ecosystem, from angles both hard and soft.
Assessing and Exploiting Mobile Applications with OWASP MobiSec jumps right to the heart of the topic: This is a hands-on, lab-driven course that will teach you a methodology for performing penetration testing on mobile devices and applications. Instructors Kevin Johnson and James Jardine will walk you through testing of iOS and Android, as well as their application and web-service back ends. By the end you'll be ready for a little capture the flag action.
For another take on the topic we'll have 0x7DF Mobile Application Bootcamp - Journeyman Level, the latest in the series previously known as HBN Reloaded. A mixture of talks and hands-on mobile application hacking, you'll tear apart top 10 mobile applications, look for flaws, and exploit them like attackers currently do. Topics will include deep dives into mobile application, static, and runtime analysis, data validation, and session management. There's a reason they call it a boot camp.
Finally, Practical ARM Exploitation takes a different tack, focusing on attacking the ARM-based architecture that underlies many mobile devices. More than mere theory, the course will introduce you to real-world ARM-exploitation scenarios with obvious applications for attacking mobile phones, tablets, and embedded devices. There'll be no better place to learn the intimate details of exploiting this most ubiquitous of architectures.
Black Hat USA 2015 will occur at the Mandalay Bay resort in Las Vegas. It goes down August 1-6, so there's plenty of time to lock in early-bird discounts.
About the Author
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024