su-a-Cyder: Homebrewing Malware for iOS Like a B0$$!

Presented at Black Hat Asia 2016, Unknown date/time (Unknown duration).

Developing malware for iOS devices has never been easier, so here is a tool to do it for you. Apple's development policy has changed, BIG TIME. What was once an Android realm problem, may be turning into a new headache for Apple. Homebrewing of Malware on iOS is now possible without leaving a trace. In this workshop, you will develop and execute your first iOS Malware sample utilizing the su-A-Cyder framework for iOS Malware PoC. Tools and Techniques will be presented live and released after the talk.


Presenters:

  • Chilik Tamir - MI3Security
    Chilik Tamir is an experienced security researcher, trainer, and speaker targeting the mobile market (Andriod,iOS). Chilik has given hands-on training for security experts at Black Hat USA 2014, Black Hat USA 2013, AT&T, Intel, HP, Cisco, Amdocs, Verint, RedBand, Pure Hacking, Hackticks -E&Y, AXA Spain and others. He has also spoken at HITB Amsterdam, OWASP Israel, and DEFCon972. Chilik is the creator of open-source iNalyzer framework for penetration testing iPhone applications, as well as other open-source security tools that he has released (AppUse for android, Belch plugin for burp proxy, Ngrep mod for Java Serialized manipulation). He was Chief Scientist at AppSec-Labs, responsible for innovating and leading security development and research of tools, exploits, and vulnerabilities in web applications. Currently, Chilik is the Chief Architect of Research and Development at MI3 Security.

Links:

Similar Presentations: