Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1


PRESENTATION MATERIALS

           

Photos and videos from all talks will be uploaded in the next couple of weeks. Please follow @HITBSecConf on Twitter or join our Facebook Group

TECH TRAINING 4 – MOBILE HACKING II

TRAINERS: Blake Turrentine (CEO, HotWAN Mobile Research and Design), Joshua ‘p0sixninja’ Hill (Member, Chronic Dev Team) & Cyril ‘pod2g’ (Member, Evad3rs)

CAPACITY: 20 pax

SEATS LEFT: REGISTRATION CLOSED

DURATION: 2 days (8th & 9th April 2013)

COST (per pax): EUR1499 (early bird) / EUR1899 (non early-bird)

HotWAN

 

 

OVERVIEW

This class seeks to provide a better understanding of the emerging trends and threats in the mobile space.

WHO SHOULD ATTEND

* Hackers

* Mobile Application Auditors

* Security Professionals involved in Mobile Security

KEY LEARNING OBJECTIVES

Participants will have the opportunity to audit mobile apps, circumvent operating systems, jailbreak / root devices, leverage mobile forensics and perform a variety of network-based attacks.

Also, there will be intros into

  • iOS / Android / ARM Internals

  • Android Xsploit D3v 

  • iPhone & iPad Mod’N

  • Harnessing the Power of Gnuradio and OpenBTS for Man-In-The-Middle Interception

Questions: blake@hotwan.com

PER-REQUISITE KNOWLEDGE

Mac, Linux, Windows experience helpful.

REQUIRED HARDWARE

Attendees bring their own laptops

  • The Trainer uses a Mac Book Pro, running Mountain Lion, 8 Gig of RAM, with the latest VMFusion installed with Xcode. If you have a Mac, use the latest version of VMFusion.

  • Windows 7 and XP laptops are also supported with the latest version of VMWare installed, but note, a few Mac-based exercises will need to be observed if you don’t bring a Mac to class.

  • Around 100 Gig of drive space is needed for ‘custom-baked’ VM image, toolz and other ‘stuff’. The VM Image was created as a Workstation 6.5-7.x Virtual Machine.

  • We will be using iPhone 4/ 4S /5, iPad 2/3, Nexus S, Galaxy Nexus and USRP N200. Participants should bring their own variety of lab smartphones / tablets and use at their own ‘risk’. Though unlikely, one such risk is that your device may get ‘bricked’ in a lab exercise and may not function ever again. Caution will be given for specific labs.

  • Being a hacking class, you will need to turn off your anti-virus / anti-spyware protection mechanisms as they may zap / quarantine / interfere with certainfiles used in the course lab exercises.

  • For more seasoned mobile hackers, bring your already rooted / jailbroken devices to class.

ABOUT THE TRAINERS

Blake Turrentine (Founder, HotWAN Mobile Research and Design)

Blake Turrentine is a “career’ penetration tester for over a dozen years working 4 a variety of folkz. Projects have included lab research, device testing, app & infrastructure hacking.

Joshua ‘p0sixninja’ Hill (Member, Chronic Dev Team)

Joshua Hill (p0sixninja from the Chronic Dev Team) has been a iOS Jailbreak Developer for more than 4 years.

Cyril ‘pod2g’ (Member, Evad3rs)

Cyril (@pod2g) is an independant security researcher who has discovered and exploited several bootrom exploits on iDevices, including 24kpwn, steaks4uce, and SHAtter, as well as several userland and kernel exploits that have been used in various jailbreak tools. He is the initiator of Corona and Rocky-Racoon, the latests public jailbreaks for iOS. In December 2012, he created the 2G Lab company, focused on software development and security research projects.

EVENT ORGANIZER

LOCAL PARTNER

PLATINUM SPONSOR

GOLD SPONSORS

>

TITANIUM SPONSOR (POST CONFERENCE RECEPTION + SPEAKER RECEPTION)

SILVER SPONSORS


CTF SPONSOR

ALCO_PWN SPONSOR (POST CONFERENCE PARTY)

CTF PRIZE SPONSOR

NETWORK SPONSORS AND UPLINK

ADDITIONAL SUPPORT BY

SUPPORTING MEDIA

FRIENDS OF HITB

Copyright © 2012 Hack In The Box | http://www.hackinthebox.org