Malicious MDM: Exploiting iOS MobileConfigs for Device Control

Malicious MDM: Exploiting iOS MobileConfigs for Device Control

OWASP Foundation via YouTube Direct link

IOS users Scan to Connect to the AppSec California Wireless Network Open the URL in Safari

1 of 7

1 of 7

IOS users Scan to Connect to the AppSec California Wireless Network Open the URL in Safari

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Malicious MDM: Exploiting iOS MobileConfigs for Device Control

Automatically move to the next video in the Classroom when playback concludes

  1. 1 IOS users Scan to Connect to the AppSec California Wireless Network Open the URL in Safari
  2. 2 Architectures: - Client Server Model - Email/URL/Application enrollment -One Time Application Profiles typically deployed from
  3. 3 Direct USB Connection -iPhone Configuration Utility
  4. 4 Post Deployment Exploitation -Wireless Attack
  5. 5 Post Deployment Exploitation -Application Attacks Custom Applications
  6. 6 Post Deployment Exploitation -So you have credentials... Single Factor VPN (PPTP) - Internet facing authentication
  7. 7 Preventions -Start with clean phones, then

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.