Introducing the Smartphone Penetration Testing Framework
Offered By: BruCON Security Conference via YouTube
Course Description
Overview
Syllabus
Intro
Disclaimer
3 to DARPA
The Problem: Smartphones in the Workplace
Threats against smartphones: Apps
Threats against smartphones: software bugs
Threats against smartphones: social engineering • Users can be tricked into opening malicious links
Threats against smartphones: jailbreaking
The Question
What's out there now? Pentesting from Smartphones: zAnti
Structure of the framework
Framework console
Framework GUI
Framework Smartphone App
What you can test for
Remote Vulnerability Example
Client Side Vulnerability Example Smartphone browsers, etc. are subject to vulnerabilities
Social Engineering Vulnerability Example SMS is the new email for spam/phishing attacks
Local Vulnerability Example
Post exploitation
Mitigating Strategies
Future of the Project
Taught by
BruCON Security Conference
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent