Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to leverage mobile devices during penetration testing in this conference talk from OISF 2013. Explore techniques and strategies for incorporating smartphones and tablets into security assessments, gaining insights into potential vulnerabilities and attack vectors unique to mobile platforms. Discover methods for exploiting mobile devices to gather information, bypass security controls, and gain unauthorized access to target systems. Gain practical knowledge on integrating mobile device exploitation into your penetration testing toolkit, enhancing your ability to identify and address security weaknesses in modern network environments.