YoVDO

Integrating Mobile Devices into Your Penetration Testing Program - DefCamp 2015

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Penetration Testing Courses Social Engineering Courses Mobile Device Security Courses Phishing Courses Two-Factor Authentication Courses

Course Description

Overview

Explore the integration of mobile devices into penetration testing programs in this DefCamp 2015 conference talk. Delve into topics such as corporate mobile device security, social engineering tactics, QR code vulnerabilities, mobile malware detection, and the creation of malicious applications. Learn about phishing techniques, network vulnerabilities, mobile security testing methodologies, and ways to bypass Mobile Device Management systems. Discover strategies for strengthening security postures, implementing two-factor authentication, and gaining access to iOS devices. Gain valuable insights into the evolving landscape of mobile security and its implications for penetration testing.

Syllabus

Intro
Car
Mobile Devices
Carrier Update
Corporate Mobile Devices
There is an app for everything
Social engineering works
QR codes
Detecting mobile malware
Using developer keys
Making malicious applications
What can we do
Phishing
Vulnerability on the Network
The Perimeter
Mobile Security Testing
Mobile Device Management bypasses
The bottom of the barrel
Please get over it
Questions for you
Strong security postures
Twofactor authentication
Getting onto iOS devices


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube