Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions
Offered By: Black Hat via YouTube
Course Description
Overview
Dive into a comprehensive analysis of Mobile Application Management (MAM) solutions in this 54-minute Black Hat conference talk by Ron Gutierrez and Stephen Komal. Explore the latest trends in BYOD (Bring Your Own Device) solutions, focusing on application wrapping techniques that enforce policies and enhance security at the application layer. Gain insights into the complex landscape of BYOD application wrapping products, their security claims, and their effectiveness against real-world mobile threats. Learn about the reverse engineering process for iOS and Android application wrapping solutions, examining their authentication methods, cryptographic implementations, interprocess communication (IPC), and client-side security controls. Discover security vulnerabilities uncovered in major vendor products and understand their potential impact on sensitive information. Equip yourself with valuable knowledge to make informed decisions about mobile application security in organizational settings.
Syllabus
Unwrapping the Truth: Analysis of Mobile Application Wrapping Solutions
Taught by
Black Hat
Related Courses
Ethical Hacking for Mobile Phones, Facebook & Social Media!Udemy Android Security: Effective Permission Handling
Pluralsight Learning Mobile Device Security
LinkedIn Learning Securing Android Apps
LinkedIn Learning Ethical Hacking | Metasploit Tutorial | من الصفر للاحتراف
Udemy