Topic / Sector
DAY 2 OUT OF 4 DAYS TRAINING COURSE
After a sold-out course last year at Blackhat 2020, we are back with an updated version of our course with additional coverage of ARM64, mobile browser security, and more in-depth coverage of Mobile apps and operating system security.The class starts with a basic introduction to the ARM instruction set and calling conventions followed by some reverse engineering exercises. We then learn how to write simple exploits for the ARM64 environment.
Next, we move to Mobile browser security, understand some of the browser mitigations followed by writing some simple exploits for the mobile browser.We then cover iOS and Android internals in further detail. We then discuss some of the exploitation techniques using real-world vulnerabilities (e.g., voucher_swap, checkm8, etc) followed by a walkthrough of how jailbreaks are written. We also discuss some of the common vulnerability types (Heap Overflows,Use-after-free, Uninitialized Stack variable, Race conditions).
The training then moves on to application security based on exploiting the Damn Vulnerable iOS app, Android-InsecureBankv2, and InsecurePass application written by the authors of this course in addition to a broad range of other real world applications. We then cover a variety of mitigations deployed in real-world apps and discuss how to bypass them. Slides, videos and detailed documentation on the labs will be provided to the students for practice after the class.Corellium access will be provided to students during the duration of the training course.