Главная
Study mode:
on
1
Intro
2
Car
3
Mobile Devices
4
Carrier Update
5
Corporate Mobile Devices
6
There is an app for everything
7
Social engineering works
8
QR codes
9
Detecting mobile malware
10
Using developer keys
11
Making malicious applications
12
What can we do
13
Phishing
14
Vulnerability on the Network
15
The Perimeter
16
Mobile Security Testing
17
Mobile Device Management bypasses
18
The bottom of the barrel
19
Please get over it
20
Questions for you
21
Strong security postures
22
Twofactor authentication
23
Getting onto iOS devices
Description:
Explore the integration of mobile devices into penetration testing programs in this DefCamp 2015 conference talk. Delve into topics such as corporate mobile device security, social engineering tactics, QR code vulnerabilities, mobile malware detection, and the creation of malicious applications. Learn about phishing techniques, network vulnerabilities, mobile security testing methodologies, and ways to bypass Mobile Device Management systems. Discover strategies for strengthening security postures, implementing two-factor authentication, and gaining access to iOS devices. Gain valuable insights into the evolving landscape of mobile security and its implications for penetration testing.

Integrating Mobile Devices into Your Penetration Testing Program - DefCamp 2015

DefCamp
Add to list