Главная
Study mode:
on
1
Intro
2
Who is Gustavo
3
How did this talk start
4
The first mobile top 10
5
Improper platform usage
6
Insecure communication
7
Insecure identification and authorization
8
Insufficient cryptography
9
Client code quality
10
Binary patching
11
Reverse engineering
12
Extravagant functionality
13
Cases in the news
14
Tinder
15
Strava
16
Twilio
17
Mobile Banking App
18
Android Code Reverse
19
Verify Resource
20
Give Me The Pin
21
Sandbox
22
Shared Preferences
23
Pin Lock
24
Local Pins
25
Backups
26
ADB
27
Pinlock
28
Photo Vault
29
Android Photo Vault
30
Adb Backup
31
Backup Findings
32
Another Pin Bypass
33
Class Dumping
34
Boid Methods
35
Code Injection
36
Mobile Payment App
37
Mobile Application Security
38
ASBS
39
Control Categories
40
Conclusion
41
Is Android better than iOS
Description:
Explore mobile app security vulnerabilities and defense strategies in this TROOPERS18 conference talk. Delve into the mobile top 10 security risks, including improper platform usage, insecure communication, and insufficient cryptography. Examine real-world cases involving Tinder, Strava, and Twilio. Learn about Android code reverse engineering techniques, sandbox bypasses, and exploiting shared preferences. Investigate pin lock vulnerabilities, photo vault weaknesses, and ADB backup risks. Discover mobile payment app security issues and understand the importance of application security verification standards. Gain insights on implementing effective control categories to enhance mobile app security.

Mobile App Security Fails and How To Survive Them

WEareTROOPERS
Add to list