Hacking Android & iOS apps with Deep Links and XSS: Free Workshop – Jan 21

If you are the kind of person who enjoys webinars with practical information, this webinar is for you. All action, no fluff 🙂 Hacking Android & iOS apps with Deep Links and XSS.

“Hacking Android, iOS and IoT apps by Example” is a mobile security course that provides you with case studies from real-world vulnerable applications. Course includes know-how and techniques to solve common mobile assessment challenges.

Register to this brief 60-minute workshop to find what the course covers and get access to labs covering the following topics in Android and iOS:

  • Deep Link attacks achieving user impersonation
  • Bypass authorization controls with Deep Link attacks
  • Deep Link attacks to make phone calls
  • XSS attacks and data exfiltration on Android & iOS

Attendants will be provided with:

  • Lifetime access to a training portal to practice the attack vectors covered, including deeplinks and mobile app data exfiltration with XSS
  • Vulnerable apps to practice
  • Guided exercise PDFs
  • Video recording explaining how to solve the exercises

Come and join us for this 60-minute hacking session, we’re sure you’ll leave with a thirst for more!

Hacking Android & iOS apps

Audience level

From new to advanced, content should keep all skill levels happy

Presented by:

Abraham Aranguren: After 13 years in itsec and 20 in IT Abraham is now the CEO of 7ASecurity (7asecurity.com). A company specializing in penetration testing of web/mobile apps, infrastructure, code reviews and training. Security Trainer at Blackhat USA, HITB, OWASP Global AppSec and many other events. Former senior penetration tester / team lead at Cure53 (cure53.de) and Version 1 (www.version1.com). Creator of “Practical Web Defense” – a hands-on eLearnSecurity attack / defense course (www.elearnsecurity.com/PWD). OWASP OWTF project leader, an OWASP flagship project (owtf.org). Major degree and Diploma in Computer Science, some certs: CISSP, OSCP, GWEB, OSWP, CPTS, CEH, MCSE:Security, MCSA:Security, Security+. As a shell scripting fan trained by unix dinosaurs, Abraham wears a proud manly beard. He writes on Twitter as @7asecurity@7a_@owtfp or https://7asecurity.com/blog. Multiple presentations, pentest reports and recordings can be found at https://7asecurity.com/publications

For the most up-to-date information about upcoming training events, including free workshops, check this.

New Year Sale is on! Check here