DURATION: 3 DAYS
CAPACITY: 20 pax
SEATS AVAILABLE: CLASS CANCELLED
EUR2599 (early bird)
EUR3199 (normal)
Early bird registration rate ends on the 31st of January
Overview
Guillaume Lopes (@Guillaume_Lopes) and Davy Douhine (@ddouhine), senior pentesters, will share many techniques, tips and tricks to deliver to pentesters, bug bounty researchers, app makers or just curious a 100% hands-on 3 days mobile training. Goal is to introduce tools (Adb, Apktool, Jadx, Cycript, Frida, Hopper, Needle, etc.) and techniques to help you to work faster and in a more efficient way in the mobile (Android and iOS) ecosystem. This is the exact training that you would have liked to have before wasting your precious time trying and failing while trying to assess the security of mobile applications.
A VM will be provided to the attendees with the pre-installed tools to cover most of the labs.
A Corellium access (iOS virtualisation) and a physical iOS device could be provided.
Who Should Attend
- Anyone who want to learn how to assess mobile applications with some prior knowledge on web security
- Intermediate to experienced Pentesters, Bug Hunters, Security Researchers, Security Experts and Security Managers/Architects
Key Learning Objectives
- Introduce the OWASP MSTG (Mobile Security Testing Guide) and the MASVS (Mobile Application Security Verification Standard)
- ย Learn Android and iOS security basics
- Know how to build an Android and iOS pentest toolset
- Learn how to review the codebase of a mobile application (aka static analysis)
- Run the mobile application on a rooted device (to check data security issues)
- Inspect the app via instrumentation and manipulate the runtime (aka runtime analysis)
- Man in The Middle all the network communications (aka inspect the traffic)
Prerequisite Knowledge
Hardware / Software Requirements
- A laptop with:
- 8GB of RAM at least, ideally 16GB
- 50Gb of free space (to install a VM based on Kali that weโll provide)
- Administrative privileges on your laptop + a way to deactivate anti-virus, HIPS and firewall
- VMWare Player (ideally VMWare Workstation)
- A PDF reader
- A jailbroken iDevice (iPhone/iPad/iPod) running at least iOS10 for the iOS labs (devices could be provided depending of the number of attendees).
- An Android device at least with Android 6.
Agenda – Day 1:
- iOS Basics
- Security features and iOS architecture
- Techniques: Steps and requirements
- Set-up a testing environment
- Tools
- Jailbreaks: History and types
- Targeted apps
- iOS virtualization with Corellium
- iOS Static Analysis
- Code checks
- Needle and MobSF
- Android Basics
- Android Ecosystem
- Sandboxing
- Android Components
- APK Architecture
- Android Manifest
- Android Static Analysis
- Decompilation / Disassembling
- Hardcoding secrets
- Code Tampering
- Tools
Agenda – Day 2: Dynamic analysis
- iOS Dynamic Analysis
- Caching
- Logs
- Backups
- Plist
- SQLite
- Hooking with Cycript
- Hooking with Frida
- Objection
- Android Dynamic Analysis
- Emulator or physical device
- Access Control
- LogCat
- Root-Emulator Detection
- Debugging
- Android Data Storage
- Databases
- Shared Preferences
- Internal Storage
- External Storage
Agenda – Day 3: Vulnerability Research (Module & VM)
- iOS Dynamic Analysis
- Analyze without a jailbreak
- iOS Network Security
- MiTM all the traffic
- Rvictl, Wireshark and Burpsuite
- iOS Bonus (Totally not spyware / CVE-2018-4233)
- Android Network Security
- How to intercept traffic using BurpSuite
- Certificate Pinning: How it is implemented? How to defeat it?
- Android Hooking
- Introduction of Frida
- Frida Scripting
- Hooking Native Code