Главная
Study mode:
on
1
Intro
2
Red Team 101
3
Red Team Phases
4
Why Mobiles?
5
Mobile Application
6
Mobile App Tools - Android
7
Scenario 1 - What we had
8
Scenario 1 - But here's your pwd, so login maybe?
9
Scenario 1 - How I met your mobile
10
Scenario 1 - The End
11
Scenario 1 - Takeaways
12
Scenario 2 - What we had
13
Scenario 2 - Free Mobile App Pentest
14
Scenario 2 - Reverse 2 Win
15
Scenario 2 - The End
16
Scenario 2 - Takeaways
17
Targeting Mobile Users
18
Leverage existing pentesting tools?
19
Frida for Mobile App Penetration Test
20
Create a Frida Backdoor
21
Offensive Instrumentation with Frida
22
Automating with Gadget Config
23
Reverse Shell with Frida
24
Conclusions and Further work
Description:
Explore red team engagements and the often-overlooked risks associated with mobile devices in this DefCamp 2019 conference talk. Delve into the fundamentals of red teaming, its phases, and the significance of mobile security. Examine two real-world scenarios involving mobile applications, learning about tools for Android app analysis and penetration testing techniques. Discover how to leverage existing pentesting tools for mobile targets and gain insights into using Frida for mobile app penetration testing, including creating backdoors, offensive instrumentation, and automating with Gadget Config. Conclude with a discussion on reverse shells using Frida and explore potential areas for further research in this critical aspect of information security.

Red Team Engagements and the Forgotten Risk of Mobile Devices - DefCamp - 2019

DefCamp
Add to list