Presented at
AppSec USA 2012,
Oct. 25, 2012, 11 a.m.
(45 minutes).
Learn how any Mobile Expert aims to crack the application open. While testing / reviewing Android or iOS applications, you will love these handy tricks which will teach you to extract the program code of any Mobile Application. Be it the famous encryption of Apple Applications or Google all famous Android or the RIM claimed Blackberry application, you got the application, you'll get the learning to view the code. Using demonstrations on platforms/ gadgets like Apple, Android, Blackberry, Windows Mobile, we will highlight the benefits of using the same in day to day pen-testers life cycle.
Objectives:
•To give live demonstrations of cracking the code open from the various Android/Apple/Blackberry/Windows Mobile Applications.
•To share tested and proven methods of discovering insecurities via reverse engineering.
•To learn how to efficiently conduct reverse engineering of mobile applications.
•To develop a process doc for Mobile Reverse Engineering.
Presenters:
-
sreenarayan a
- Information Security Consultant - Independant Consultant
Sreenarayan is currently working as an Independant Information Security Consultant. He was the principal researcher in the Mobile Application Security Team at Paladion, having developed Paladion's Android, iOS, Windows Mobile, BlackBerry Gray Box and Code Review checklists, and has trained 30+ engineers to detect security flaws in mobile applications. He has found flaws in leading Mobile-based financial applications and helped the respective organizations fix those vulnerabilities. He has authored many white papers on information security and network-related research, which have been published in multiple information security magazines and international journals such as Hacki9 and Palisade magazines among others. He has conducted technical trainings and provide Experts Talk about various platforms for multiple banking & finance customers and reputed institutes in the Mumbai University. He is a Certified Ethical Hacker, Certified Security Analyst and Certified Forensics Investigator.
Links:
Similar Presentations: