Request a Demo Contact Us
Check out our new MSP offering for scalable pentests
Learn More

Breaking Mobile App Protection Mechanisms

 

This talk will teach individuals how to identify mobile app protections: obfuscation, root/jailbreak detection, Cert Pinning, Cert Validation and debugger detection. All of the various protections will be bypassed . The goal is to demonstrate how “hardened” gyarados mobile apps can be easily brought back down to magic karp level of defense.

More resources

Guide

Guide to Working with Hackers

Read More
Guide

Ultimate Guide to Crowdsourced Security for SaaS Companies

Read More
eBooks

7 Steps for Implementing a Vulnerability Disclosure Program

Read More

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.