Introducing the Smartphone Penetration Testing Framework

Introducing the Smartphone Penetration Testing Framework

BruCON Security Conference via YouTube Direct link

Post exploitation

20 of 22

20 of 22

Post exploitation

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Introducing the Smartphone Penetration Testing Framework

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Disclaimer
  3. 3 3 to DARPA
  4. 4 The Problem: Smartphones in the Workplace
  5. 5 Threats against smartphones: Apps
  6. 6 Threats against smartphones: software bugs
  7. 7 Threats against smartphones: social engineering • Users can be tricked into opening malicious links
  8. 8 Threats against smartphones: jailbreaking
  9. 9 The Question
  10. 10 What's out there now? Pentesting from Smartphones: zAnti
  11. 11 Structure of the framework
  12. 12 Framework console
  13. 13 Framework GUI
  14. 14 Framework Smartphone App
  15. 15 What you can test for
  16. 16 Remote Vulnerability Example
  17. 17 Client Side Vulnerability Example Smartphone browsers, etc. are subject to vulnerabilities
  18. 18 Social Engineering Vulnerability Example SMS is the new email for spam/phishing attacks
  19. 19 Local Vulnerability Example
  20. 20 Post exploitation
  21. 21 Mitigating Strategies
  22. 22 Future of the Project

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.