Introduction to Android Application Exploitation

Workshop covering the basics of Android Application Pen-testing and Exploitation

Shruthi Kamath

@shruthikamath

Dynamic Analysis

Submitted Aug 2, 2015

This part of the session will cover how to test android applications dynamically.

Outline

Using the proxy set up in the previous session, we will perform dynamic testing on the applications and try to find out vulnerabilities that are similar to the vulnerabilities found during the pentesting of a traditional web app pentesting.

Speaker bio

Apoorva Giri
Apoorva works as a Security Analyst with iViZ Security (a Cigital company). She is the co-founder of InfoSec Girls, a community that aims to encourage more women to enter the domain of Information Security. She has presented a workshop on “Cyber Security and Ethical Hacking for Women” at c0c0n 2014 at Kochi, Kerala. She’s an active member of Null/OWASP Bangalore Chapter. She has been listed on the Barracuda Hall of Fame for finding vulnerabilities on their application. She is currently working on Mobile Application security.
Her contact information is below:

Shruthi Kamath
Shruthi works as a Security Analyst at Infosys Limited. She is the co-founder of InfoSec Girls. She is a certified Ethical Hacker from EC Council. She’s an active member of Null/OWASP Bangalore Chapter. She is passionate about learning new things. Her interest in InfoSec lies in web application security. She has spoken at security conference like c0c0n and null meets. She has been a part of Jailbreak NULLCON 2014. She presented a talk on “Cybercrimes in India and its Mitigation” at the National Conference for Women Police held at Trivandrum

Comments

{{ gettext('Login to leave a comment') }}

{{ gettext('Post a comment…') }}
{{ gettext('New comment') }}
{{ formTitle }}

{{ errorMsg }}

{{ gettext('No comments posted yet') }}

Hosted by

droidconIN is an annual conference on Android, part of the worldwide series of events. more