DeepSec 2013 Video: Using Memory, Filesystems And Runtime To App Pen iOS And Android
Your iOS or Android smartphone can do a lot. „There’s an app for that!“ is also true for information security. So what can you do? We have seen smartphones used as an attack platform for penetration testing. You can use them for wardriving, and, of course, for running malicious software (next to „normal“ software which can do a lot too). At DeepSec 2013 Andre Gironda unlocked some of the mysteries of the iDevice and Android-device memory intrinsics, filesystem/process sandboxes, and the OO runtime by walking through the techniques, including common obfuscations. His talk is recommended to anyone interested in the capabilities of modern smartphones.
RT @deepsec: #DeepSec 2013 Video: Using Memory, Filesystems And Runtime To App Pen #iOS And #Android: … http://t.co/0SJD0j2BtF