Come join me while I do a three part series on android app pen-testing at the next three stl2600/DC314 meetings!
First session is setup and intent spoofing. (5/6/18)
Second is exploiting exported content providers and insecure file storage. (6/4/18)
Third is exploiting exported broadcast receivers. (7/1/18)
In each case we examine the source code of an app with the vuln and
and how to exploit. Then discuss the hallmarks on how to find them in other apps "grep dorks".
People can/should bring their own systems to play along! I hope to see you there!
More info HERE
Saturday, March 31, 2018
Three part series on android app pen-testing at stl2600/dc314 by me!
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment