If you are the kind of person who enjoys workshops with practical information that you can immediately apply when you go back to work, this workshop is for you: all action, no fluff.
If you are the kind of person who enjoys workshops with practical information that you can immediately apply when you go back to work, this workshop is for you: all action, no fluff. Participants will gain hands-on experience attacking real-world mobile apps using a provided training portal, covering attack surfaces such as deep links and mobile data exfiltration with XSS.
We will walk through interesting vulnerabilities discovered during years of real-world mobile app pentesting, including:
Anonymized findings from confidential reports
Flaws in secure open-source apps (e.g., password vaults, privacy browsers)
Security issues in government and high-profile apps (e.g., Smart Sheriff)
Vulnerabilities with real-world implications (e.g., apps for reporting human rights abuse)
Attendees will leave with a solid understanding of mobile app security anti-patterns and how to exploit or defend against them.
After 17 years in IT security and 24 in IT, Abraham Aranguren is now the CEO of 7ASecurity
(7asecurity.com), a company specializing in penetration testing of web/mobile apps,
infrastructure, code reviews, and training. He is also the co-author of mobile, web and desktop (Electron) app 7ASecurity courses; a security trainer at Blackhat USA, HITB, OWASP Global AppSec and many other events; and an OWASP OWTF project leader for an OWASP flagship project (owtf.org). Abraham holds a major degree and diploma in Computer Science and multiple certificates, including CISSP, OSCP, GWEB, OSWP, CPTS, CEH, MCSE:Security, MCSA:Security, and Security+.
As a shell scripting fan trained by unix dinosaurs, Abraham wears a proud manly beard.
He writes on social media as @7asecurity and @7a_ @owtfp and online at https://7asecurity.com/blog. Multiple presentations, pentest reports, and recordings can be found at https://7asecurity.com/publications.