Introducing the Smartphone Penetration Testing Framework
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
Disclaimer
3 to DARPA
The Problem: Smartphones in the Workplace
Threats against smartphones: Apps
Threats against smartphones: software bugs
Threats against smartphones: social engineering • Users can be tricked into opening malicious links
Threats against smartphones: jailbreaking
The Question
What's out there now? Pentesting from Smartphones: zAnti
Structure of the framework
Framework console
Framework GUI
Framework Smartphone App
What you can test for
Remote Vulnerability Example
Client Side Vulnerability Example Smartphone browsers, etc. are subject to vulnerabilities
Social Engineering Vulnerability Example SMS is the new email for spam/phishing attacks
Local Vulnerability Example
Post exploitation
Mitigating Strategies
Future of the Project
Taught by
BruCON Security Conference
Related Courses
Penetration Testing - Post ExploitationNew York University (NYU) via edX Metasploit Framework: Penetration Testing with Metasploit
Udemy Metasploit
Cybrary Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube Advanced Phishing Tactics Beyond User Awareness
YouTube