Presented at
AppSec USA 2014,
Sept. 19, 2014, 9 a.m.
(180 minutes).
In this hands-on session, I will introduce the project and highlight the roadmap and its history. I will highlight some of the key binary risks that this project addresses (reverse engineering, method swizzling, etc.). Participants will use jailbroken mobile devices / mac workstations (provided by me) to perform actual binary attacks.
Objectives:
1. Understand what the project is about;
2. Perform actual attacks on jailbroken devices;
3. Explore project contribution ideas;
4. Develop relevant mobile attack vectors
Contact:
Jonathan Carter
jonathan.carter@owasp.org
Links:
Similar Presentations: