Unwrapping the Truth - Analysis of Mobile Application Wrapping Solutions
Offered By: Black Hat via YouTube
Course Description
Overview
Dive into a comprehensive analysis of Mobile Application Management (MAM) solutions in this 54-minute Black Hat conference talk by Ron Gutierrez and Stephen Komal. Explore the latest trends in BYOD (Bring Your Own Device) solutions, focusing on application wrapping techniques that enforce policies and enhance security at the application layer. Gain insights into the complex landscape of BYOD application wrapping products, their security claims, and their effectiveness against real-world mobile threats. Learn about the reverse engineering process for iOS and Android application wrapping solutions, examining their authentication methods, cryptographic implementations, interprocess communication (IPC), and client-side security controls. Discover security vulnerabilities uncovered in major vendor products and understand their potential impact on sensitive information. Equip yourself with valuable knowledge to make informed decisions about mobile application security in organizational settings.
Syllabus
Unwrapping the Truth: Analysis of Mobile Application Wrapping Solutions
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube