DefCamp 2015 - Pentesting Android Applications

DefCamp 2015 - Pentesting Android Applications

DefCamp

9 лет назад

6,034 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@seifallaya
@seifallaya - 26.01.2016 13:03

Quite long talk but certainly a great one.

Ответить
@arjuninvincible6432
@arjuninvincible6432 - 04.03.2016 01:26

Informative Talk

Ответить
@predatorvj1
@predatorvj1 - 12.08.2016 17:46

Well nice presentation . Most of the things were same as pentester academy . However there are better tools that what you told .
1.100% class file recovery is not possible .Atleast most of the time
2. X.509 Certificate issue is more worst than explained .
3. There are issues with Webviews - not explained .
4.Static and Dynamic code analysis is good but now there is automated tool(python coded) showcased in defcon .
5. May be you could have demonstrated some app with actual exploit and payload
Being an Indian must confess overall it was upto the mark .

Ответить
@kapilajain9692
@kapilajain9692 - 14.10.2016 13:08

Well Genymotion never sucks. Its a really good emulator. You can do almost everything in genymotion except for making call and bluetooth connection.

Ответить
@s.nikolic497
@s.nikolic497 - 17.11.2017 04:17

Great video

Ответить
@allamaprabhu7
@allamaprabhu7 - 09.04.2018 14:03

Could have been precise and curated for right audience. Had to search across whole content to find actual hack.

Ответить
@sudarshanpawar4596
@sudarshanpawar4596 - 18.04.2018 20:03

Yo Sneha!

Ответить
@chandrakantdehury
@chandrakantdehury - 08.09.2018 11:48

Firstly secondly what the fuck going on

Ответить