MAHH Training Live

Mobile Application Hacker’s Handbook Live Training

MDSec are recognised experts in Mobile Security. Our latest edition of the Mobile Application Hacker’s Handbook [Wiley, 2015] spans 816 pages, and we run numerous global training courses on mobile security for development teams, and professional testers alike. This course follows chapters 1-9 of the Mobile Application Hacker’s Handbook, with a strong focus on practical attacks. Over the 2-day training course delivered by the lead author of the book, delegates will learn the tricks and techniques to hack mobile applications on the iOS and Android platforms.

The course is an all-new novice to advanced level class that walks through the iOS and Android sections of the Mobile Application Hacker’s Handbook. It provides the most comprehensive and cutting edge guide to mobile application security, including coverage of both iOS and Android.

Delegates will gain a theoretical and practical understanding of:

  • How to quickly and efficiently pinpoint and exploit vulnerabilities in iOS and Android apps,
  • How to decompile, reverse and patch iOS and Android apps,
  • How to hack webviews, client-side databases and the keychain,
  • Instrument application runtimes using Frida, CydiaSubstrate, Cycript and Substrate tweaks,
  • Exploitation of IPC mechanisms including content providers, URL handlers, broadcasts and intents,
  • Practical exploitation of poorly implemented cryptography,
  • Real-world techniques used to defeat real apps on iOS and Android!
  • Knowledge of defensive and remedial advice.

Daily Class Outline:

Day 1:

The course begins with a brief introduction to mobile application security and the OWASP mobile top ten, following chapter 1 of the book. When delegates are comfortable with general mobile application security practices, we delve in to the security of the iOS platform, including an overview of the platform security features, jailbreaking and approaches to app security assessment. The following modules then review chapters 2, 3 and 4 of the book where common insecurities are covered, including but not limited too:

  • Reverse engineering and patching binaries,
  • Insecure file storage,
  • Keychain attacks,
  • Insecure transport security,
  • Instrumenting the iOS runtime,
  • Injection attacks,
  • How to exploit IPC handlers,
  • How to defeat security controls like jailbreak detection.

Day 2:

Day two of the course picks up at chapter 6, discussing the various attack surfaces for the Android platform and how to approach an app assessment. We then walk through the details the techniques that from chapter 7 and 8 that can be used to attack Android applications, including the following topics:

  • Reverse engineering and decompiling Android apps,
  • Insecure file storage,
  • Insecure transport security,
  • Instrumentation of the Dalvik runtime with Frida and Substrate,
  • Exploitation of insecure IPC endpoints,
  • Tap jacking.

2018 Training Schedule

This training is available at a number of public events, to register you should contact the event holder:

Unable to attend any of the above? Contact us for information on in-house and private training sessions.

Ready to start testing your applications?

Speak to one of our industry experts and find out how MDSec can help your business.

+44 (0) 1625 263 503