Our good friend John Doe hasn't come to work in two days. Strangely enough he left his mobile behind, his precious iPhone. Maybe there is a chance of finding some intel on the phone? But is it locked? Maybe Jailbroken? Let's simply give it a try. We might even be able to find and track his private Android phone! The two day Hacking Mobiles workshop will give real-life insight into what one can actually do with the odd phone one finds on a desk (or somewhere else). After a short introduction and tutorial, you yourself will have to access a strange mobile, extracting all data you can find, reach and recover.
Brian Butterly is a security researcher and pentester for the Mobile Security Team at ERNW. Coming from the field of electrical engineering he tends to seek alternate approaches when looking at new devices. He recently started a research project on the functionialty and security in LTE networks.
Sergej Schmidt works at the Mobile Security Team, where he spends most of his time testing mobile apps and their backends trying to circumvent their security mechanisms. Besides pentesting he also does research in the area of iOS and Android platforms.