€ 4.000,00
€ 3.600,00
This comprehensive fast paced 4-day training delivers an in-depth exploration of iOS and Android application security, OS internals, and the application of AI in mobile pentesting. The iOS segment dives into the core architecture of the latest iOS 26, covering memory management, application sandboxing, and code signing. We will analyze advanced mitigations like SPTM, TXM, PAC, PAN, PPL, and the new MTE features. Participants will gain a thorough introduction to the ARM64 architecture, complete with static and dynamic analysis techniques, debuggers, and disassembly tools.
Transitioning to application security, we explore code signing, encryption, secure communication, and dynamic instrumentation with Frida. Advanced labs will cover hooking, memory manipulation, and network instrumentation. The course also features a dedicated module on iOS malware analysis, teaching static, dynamic, and behavioral analysis with now incorporating AI driven techniques for reversing along with robust mitigation and prevention strategies.
On the Android side, participants will gain a broad understanding of the Android system architecture, including IPC mechanisms like Binder, and security features such as DAC, CAP, RKP, and SELinux. Hands-on labs provide deep experience in reverse engineering, exploit development for ARM platforms, memory management, and vulnerability analysis. Expect to see new up to date Malwares from out in the wild.
Practical labs will guide students through extracting and decrypting boot images, symbolicating the Android kernel, and porting exploits. The course includes techniques on exploiting Android applications and IPC components. We explore advanced Frida techniques like custom tracing, profiling, memory inspection and the use of AI and MCP servers in modern reversing and forensic analysis. Through case studies of prominent malware and custom designed samples, participants will master advanced forensics and identify application security vulnerabilities within core Android components.
By the end of this course, students will possess the advanced skills to reverse engineer, design, develop, and secure iOS and Android applications, equipped with a deep understanding of the latest security measures in both the userland and the kernel. Slides, and detailed documentation on the labs will be provided to the students for practice after the class. Corellium access will be provided to students during the duration of the training course.
By the end of the course, students will have the skills needed to reverse engineer, design, develop, and secure iOS and Android applications effectively, as well as have a good understanding of all the security measures implemented in Android/iOS Userland and Kernel.
Attendees will:
Prateek is currently working as the Head of Product & Application Security. He has more than 10 years of experience in security research and penetration testing. His core focus area is mobile exploitation, reverse engineering and embedded device security. He is also the author of the open source vulnerable application named Damn Vulnerable iOS app. He has presented and trained at many international conferences including Defcon, POC, TyphoonCon, Blackhat USA, Brucon, Hack in Paris, Phdays, Appsec USA etc. In his free time, he blogs at https://highaltitudehacks.com/.
Dinesh currently leads the Mobile Security Testing Center of Excellence. His core area of expertise is Mobile and Embedded application pentesting and exploitation. He has previously spoken at conferences like Black Hat, Bsides, POC, Def Con, BruCon, AppsecUSA, AppsecEU, HackFest and many more. He maintains multiple open-source intentionally vulnerable Android applications for use by developers and security enthusiasts. He has also authored the guide to Mitigating Risk in IoT systems that covers techniques on security IoT devices and Hacking iOS Applications that covers the known techniques of exploiting iOS applications. Visit http://8ksec.io/blog for technical articles and content by 8kSec Research Team.
To successfully participate in this course, attendees should possess the following:
Laptop: 8+ GB RAM and 40 GB hard disk space.
Permissions: Administrative access on the system. Students will be provided with access to Corellium for iOS and Android hands-on labs and do not need to carry physical mobile devices. A MacBook though helpful, is not mandatory for the class.
Trainees will receive:
Rather than focusing only on theory, the training emphasizes learning by doing. Key concepts are introduced and reinforced through hands-on lab work, allowing participants to gain practical experience throughout the course.
The course runs for four days and covers the following: