{"id":10072,"date":"2022-11-17T04:58:50","date_gmt":"2022-11-17T04:58:50","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/"},"modified":"2023-04-18T06:25:09","modified_gmt":"2023-04-18T06:25:09","slug":"offensive-mobile-reversing-and-exploitation-hitb2023ams","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/","title":{"rendered":"Offensive Mobile Reversing and Exploitation"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<h2><strong><span style=\"color: #993300\">REGISTRATION CLOSED<\/span><\/strong><\/h2>\n<h4><strong>DATE: 17-20 April 2023<\/strong><\/h4>\n<\/div>\n<h4><strong>TIME: 09:00 to 17:00 CEST\/GMT+2<\/strong><\/h4>\n<table style=\"height: 216px\" width=\"778\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>17 Apr<\/td>\n<td>Monday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours \u2013 Presentations &amp; Hands-on exercises<\/td>\n<\/tr>\n<tr>\n<td>18 Apr<\/td>\n<td>Tuesday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours \u2013 Presentations &amp; Hands-on exercises<\/td>\n<\/tr>\n<tr>\n<td>19 Apr<\/td>\n<td>Wednesday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours \u2013 Presentations &amp; Hands-on exercises<\/td>\n<\/tr>\n<tr>\n<td>20 Apr<\/td>\n<td>Thursday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours \u2013 Presentations &amp; Hands-on exercises<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<hr \/>\n<h5>After running sold-out trainings at multiple conferences over the last few years, we are back with an updated version of our course which now covers ARM64, mobile browser security, and detailed Mobile apps and operating system security. The class starts with a basic introduction to the ARM instruction set and calling conventions followed by some reverse engineering exercises. We then learn how to craft simple exploits for the ARM64 environment.<\/h5>\n<p>Next, we move to Mobile browser security, understand some of the browser mitigations followed by writing some simple exploits for the mobile browser. We then cover iOS and Android internals in further detail. We then discuss some of the exploitation techniques using real-world vulnerabilities (e.g., voucher_swap, checkm8, etc) followed by a walkthrough of how jailbreaks are written. We also discuss some of the common vulnerability types (Heap Overflows, Use-after-free, Uninitialized Stack variable, Race conditions).<\/p>\n<p>The training then moves on to application security based on exploiting the Damn Vulnerable iOS app, Android-InsecureBankv2, and InsecurePass application written by the authors of this course in addition to a broad range of other real-world applications. We also cover a variety of mitigations deployed in real-world apps and discuss how to bypass them.<\/p>\n<p>Slides, videos and detailed documentation on the labs will be provided to the students for practice after the class. Corellium access will be provided to students during the duration of the training course.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Key Learning Objectives<\/strong><\/h5>\n<ul>\n<li>Get an understanding of latest ARM64 instruction set<\/li>\n<li>Understand the Browser Security mitigations on Mobile Devices<\/li>\n<li>Understand some common vulnerabilities in Mobile Browsers<\/li>\n<li>Learn the internals of iOS and Android Kernel along with several Kernel security mitigations<\/li>\n<li>Understand some of the latest bugs and mitigations (PAC, CoreTrust, PPL, etc)<\/li>\n<li>Get an intro to some common bug categories UaF, Heap overflow, etc<\/li>\n<li>Understand how jailbreaks and exploits are written (including iOS 15-16)<\/li>\n<li>Reverse engineer iOS and Android binaries (Apps and system binaries)<\/li>\n<li>Do basic fuzz testing on Mobile apps<\/li>\n<li>Learn how to audit iOS and Android apps for security vulnerabilities<\/li>\n<li>Understand and bypass anti-debugging and obfuscation techniques<\/li>\n<li>Get a quick walkthrough on using IDA Pro, Hopper, Frida, etc<\/li>\n<\/ul>\n<h5><\/h5>\n<h5><strong>Students will be provided with:<\/strong><\/h5>\n<ul>\n<li>Videos for some vulnerabilities shared in the class<\/li>\n<li>Huge list of good reads and articles for learning mobile application security<\/li>\n<li>Source code for vulnerable applications<\/li>\n<li>Source code for Exploit PoCs&#8217; that can be used for Bug Bounties<\/li>\n<li>Custom VM for hands-on pentesting<\/li>\n<li>Students will be provided with access to Corellium for iOS hands-on for the duration of the course<\/li>\n<li>Students using machines that do not support virtualization will be provided access to cloud instances for the duration of the course<\/li>\n<li>Slack access for the class and after for regular mobile security discussions<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Topics Covered<\/strong><\/h5>\n<p><strong>Part 1 &#8211; ARM and Browser Security<\/strong><\/p>\n<p><strong>Module 1:<\/strong><\/p>\n<p>&#8211; Exploring the ARM64 instruction set<br \/>\n&#8211; ARM calling conventions<br \/>\n&#8211; ARM memory management<br \/>\n&#8211; Reversing ARM binaries<br \/>\n&#8211; Reversing the XNU kernel<br \/>\n&#8211; Exploiting a simple Heap Overflow<br \/>\n&#8211; Building a simple ROP chain<br \/>\n&#8211; Exploiting a simple Race Condition vuln<br \/>\n&#8211; Exploiting uninitialized stack variable vulnerability<br \/>\n&#8211; Breaking ASLR with Info leaks\/Brute force<br \/>\n&#8211; Exploit mitigations (ASLR, Heap Poisoning, PAN, etc)<\/p>\n<p><strong>Module 2:<\/strong><\/p>\n<p>&#8211; Setting up WebKit environment<br \/>\n&#8211; Debugging WebKit<br \/>\n&#8211; WebCore and JavaScriptCore internals<br \/>\n&#8211; Browser Mitigations &#8211; IsoHeaps, Gigacage, StructureID randomness, Site Isolation, etc<br \/>\n&#8211; JSC Side effects<br \/>\n&#8211; UaF, TypeConfusion etc<br \/>\n&#8211; Exploiting a DOM UaF<br \/>\n&#8211; Getting addrof() and fakeobj() primitive<br \/>\n&#8211; Getting arbitrary r\/w<br \/>\n&#8211; Creating Stage 2<br \/>\n&#8211; SOP Bypass, Impact of PAC<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Part 2 &#8211; iOS Exploitation<\/strong><\/p>\n<p><strong>Module 1: Getting Started with iOS Security<\/strong><\/p>\n<p>&#8211; iOS security model<br \/>\n&#8211; App Signing, Sandboxing, and Provisioning<br \/>\n&#8211; Primer to iOS 15 security<br \/>\n&#8211; Exploring the iOS filesystem<br \/>\n&#8211; Intro to Objective-C and Swift5<br \/>\n&#8211; Setting up the testing environment<br \/>\n&#8211; Jailbreaking your device<br \/>\n&#8211; Cydia, Mobile Substrate<br \/>\n&#8211; Sideloading apps<br \/>\n&#8211; Binary protection<br \/>\n&#8211; Checking for PIE, ARC<br \/>\n&#8211; Decrypting IPA files<br \/>\n&#8211; Self-signing IPA files<\/p>\n<p><strong>Module 2: iOS exploitation basics<\/strong><\/p>\n<p>&#8211; The Boot Chain &#8211; Bootrom, LLB, iBoot<br \/>\n&#8211; Keybags, firmware keys<br \/>\n&#8211; Decrypting iBoot<br \/>\n&#8211; Reversing the Kernel<br \/>\n&#8211; Symbolicating the kernel<br \/>\n&#8211; ARM Pointer authentication<br \/>\n&#8211; KPP and KTRR<br \/>\n&#8211; Intro to Mach IPC, Port spraying<br \/>\n&#8211; XNU zones<br \/>\n&#8211; Discussion of the voucher_swap and checkm8 exploit<br \/>\n&#8211; How are jailbreak exploits written?<br \/>\n&#8211; Diffing for Patches<br \/>\n&#8211; CoreTrust, PPL<br \/>\n&#8211; Sandbox escape<br \/>\n&#8211; Chaining exploits<br \/>\n&#8211; Applying Kernel Patches<br \/>\n&#8211; Achieving persistence<\/p>\n<p><strong>Module 3: Static and Dynamic Analysis of iOS Apps<\/strong><\/p>\n<p>&#8211; Static Analysis of iOS applications<br \/>\n&#8211; Finding Secrets in Code<br \/>\n&#8211; Lint Testing<br \/>\n&#8211; Dumping class information<br \/>\n&#8211; Insecure local data storage<br \/>\n&#8211; Dumping Keychain<br \/>\n&#8211; Exploiting URL schemes<br \/>\n&#8211; Dynamic Analysis of iOS applications<br \/>\n&#8211; Method Swizzling<br \/>\n&#8211; Debugging apps using lldb<br \/>\n&#8211; Modifying ARM registers<br \/>\n&#8211; Basic App Exploitation techniques using Frida<br \/>\n&#8211; Advance App Exploitation techniques using Frida<br \/>\n&#8211; Testing React Native and Flutter Apps<\/p>\n<p><strong>Module 4: iOS application vulnerabilities<\/strong><\/p>\n<p>&#8211; Exploiting iOS applications<br \/>\n&#8211; Broken Cryptography<br \/>\n&#8211; Side channel data leakage<br \/>\n&#8211; Sensitive information disclosure<br \/>\n&#8211; Exploiting URL schemes<br \/>\n&#8211; Client-side injection<br \/>\n&#8211; Bypassing jailbreak, piracy checks<br \/>\n&#8211; Inspecting Network traffic<br \/>\n&#8211; Traffic interception over HTTP, HTTPs<br \/>\n&#8211; Manipulating network traffic<br \/>\n&#8211; Bypassing SSL pinning<\/p>\n<p><strong>Module 5: Reversing iOS Apps<\/strong><\/p>\n<p>&#8211; Introduction to Hopper<br \/>\n&#8211; Disassembling methods<br \/>\n&#8211; Modifying assembly instructions<br \/>\n&#8211; Patching App Binary<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Part 3 &#8211; Android Exploitation<\/strong><\/p>\n<p><strong>Module 1: Intro to Android Security<\/strong><\/p>\n<p>&#8211; Why Android<br \/>\n&#8211; Android Security Architecture<br \/>\n&#8211; Extracting APK files from Google Play<br \/>\n&#8211; Understanding Android application structure<br \/>\n&#8211; Signing Android applications<br \/>\n&#8211; ADB \u2013 Non-Root<br \/>\n&#8211; Rooting Android devices<br \/>\n&#8211; ADB \u2013 Rooted<br \/>\n&#8211; Understanding the Android file system<br \/>\n&#8211; Permission Model Flaws<br \/>\n&#8211; Attack Surfaces for Android applications<\/p>\n<p><strong>Module 2: Components<\/strong><\/p>\n<p>&#8211; Understanding Android Components<br \/>\n&#8211; Introducing Android Emulator<br \/>\n&#8211; Introducing Android AVD<br \/>\n&#8211; Setting up Android Pentest Environment<\/p>\n<p><strong>Module 3: Reversing Android apps<\/strong><\/p>\n<p>&#8211; Process of Android Apps Engineering<br \/>\n&#8211; Reverse Engineering for Android Apps<br \/>\n&#8211; Smali Learning Labs<br \/>\n&#8211; Examining Smali files<br \/>\n&#8211; Smali vs Java<br \/>\n&#8211; Dex Analysis and Obfuscation<br \/>\n&#8211; Reversing Obfuscated Android Applications<br \/>\n&#8211; Patching Android Applications<br \/>\n&#8211; Android App Hooking<\/p>\n<p><strong>Module 4: Static and Dynamic analysis<\/strong><\/p>\n<p>&#8211; Proxying Android Traffic<br \/>\n&#8211; Exploiting Local Storage<br \/>\n&#8211; Exploiting Weak Cryptography<br \/>\n&#8211; Exploiting Side Channel Data Leakage<br \/>\n&#8211; Multiple Manual and Automated Root Detection and Bypass Techniques<br \/>\n&#8211; Exploiting Weak Authorization mechanism<br \/>\n&#8211; Identifying and Exploiting Android Components<br \/>\n&#8211; Analysing Proguard, DexGuard, and other Obfuscation Techniques<br \/>\n&#8211; Exploiting Android NDK<br \/>\n&#8211; Android Game Hacking<br \/>\n&#8211; Multiple Manual and Automated SSL Pinning Bypass techniques<br \/>\n&#8211; Writing One-Click Remote Code execution exploits for Android applications<br \/>\n&#8211; Exploiting Android Google Play Billing<br \/>\n&#8211; Firebase Exploitation<br \/>\n&#8211; Exploiting Android Games<br \/>\n&#8211; In-memory tampering<\/p>\n<p><strong>Module 5: Frida and Automated Exploitation<\/strong><\/p>\n<p>&#8211; Exploiting Crypto using Frida<br \/>\n&#8211; Basic App Exploitation techniques using Frida<br \/>\n&#8211; Dumping Class Information using Frida<br \/>\n&#8211; Dumping Method Information using Frida<br \/>\n&#8211; Viewing and Changing Information using Frida<br \/>\n&#8211; Tracing using Frida<br \/>\n&#8211; Advance App Exploitation techniques using Frida<br \/>\n&#8211; Frida on non-rooted Android<\/p>\n<p><strong>Module 6: Android Kernel Exploitation<\/strong><\/p>\n<p>&#8211; Introduction to Android Kernel Exploitation<br \/>\n&#8211; Recreating 1-day Exploits<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>REGISTRATION CLOSED DATE: 17-20 April 2023 TIME: 09:00 to 17:00 CEST\/GMT+2 Date Day Time Duration 17 Apr Monday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; Hands-on exercises 18 Apr Tuesday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; Hands-on exercises 19 Apr Wednesday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; [&hellip;]<\/p>\n","protected":false},"featured_media":10071,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false},"product_cat":[57,55,56],"product_tag":[],"class_list":{"0":"post-10072","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-4-day-training","7":"product_cat-hitb2023ams","8":"product_cat-in-person","10":"first","11":"instock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Offensive Mobile Reversing and Exploitation - HITBSecConf2023 - Amsterdam<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Offensive Mobile Reversing and Exploitation - HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"og:description\" content=\"REGISTRATION CLOSED DATE: 17-20 April 2023 TIME: 09:00 to 17:00 CEST\/GMT+2 Date Day Time Duration 17 Apr Monday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; Hands-on exercises 18 Apr Tuesday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; Hands-on exercises 19 Apr Wednesday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-18T06:25:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Offensive-Mobile-Reversing-and-Exploitation.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/\",\"name\":\"Offensive Mobile Reversing and Exploitation - HITBSecConf2023 - Amsterdam\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Offensive-Mobile-Reversing-and-Exploitation.jpeg\",\"datePublished\":\"2022-11-17T04:58:50+00:00\",\"dateModified\":\"2023-04-18T06:25:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Offensive-Mobile-Reversing-and-Exploitation.jpeg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Offensive-Mobile-Reversing-and-Exploitation.jpeg\",\"width\":1200,\"height\":1600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Offensive Mobile Reversing and Exploitation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\",\"name\":\"HITBSecConf2023 - Amsterdam\",\"description\":\"#HITB2021AMS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Offensive Mobile Reversing and Exploitation - HITBSecConf2023 - Amsterdam","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/","og_locale":"en_US","og_type":"article","og_title":"Offensive Mobile Reversing and Exploitation - HITBSecConf2023 - Amsterdam","og_description":"REGISTRATION CLOSED DATE: 17-20 April 2023 TIME: 09:00 to 17:00 CEST\/GMT+2 Date Day Time Duration 17 Apr Monday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; Hands-on exercises 18 Apr Tuesday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; Hands-on exercises 19 Apr Wednesday 09:00 to 17:00 CEST\/GMT+2 8 Hours \u2013 Presentations &amp; [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/","og_site_name":"HITBSecConf2023 - Amsterdam","article_modified_time":"2023-04-18T06:25:09+00:00","og_image":[{"width":1200,"height":1600,"url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Offensive-Mobile-Reversing-and-Exploitation.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/","name":"Offensive Mobile Reversing and Exploitation - HITBSecConf2023 - Amsterdam","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Offensive-Mobile-Reversing-and-Exploitation.jpeg","datePublished":"2022-11-17T04:58:50+00:00","dateModified":"2023-04-18T06:25:09+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Offensive-Mobile-Reversing-and-Exploitation.jpeg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Offensive-Mobile-Reversing-and-Exploitation.jpeg","width":1200,"height":1600},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/offensive-mobile-reversing-and-exploitation-hitb2023ams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/"},{"@type":"ListItem","position":3,"name":"Offensive Mobile Reversing and Exploitation"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/","name":"HITBSecConf2023 - Amsterdam","description":"#HITB2021AMS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product\/10072"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/comments?post=10072"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media\/10071"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media?parent=10072"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_cat?post=10072"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_tag?post=10072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}