Hacking Mobiles

From March 17, 2014 to March 18, 2014

Our good friend John Doe hasn't come to work in two days. Strangely enough he left his mobile behind, his precious iPhone. Maybe there is a chance of finding some intel on the phone? But is it locked? Maybe Jailbroken? Let's simply give it a try. We might even be able to find and track his private Android phone! The two day Hacking Mobiles workshop will give real-life insight into what one can actually do with the odd phone one finds on a desk (or somewhere else). After a short introduction and tutorial, you yourself will have to access a strange mobile, extracting all data you can find, reach and recover.

Agenda

Attacking iOS and Android Devices

Circumventing Security Measures (Use of Tools introduced before)

Android and iOS Apps

Short insights into Windows Phone 8 and Blackberry 10

Brian Butterly

Brian Butterly is a security researcher and pentester for the Mobile Security Team at ERNW. Coming from the field of electrical engineering he tends to seek alternate approaches when looking at new devices. He recently started a research project on the functionialty and security in LTE networks.

Sergej Schmidt

Sergej Schmidt works at the Mobile Security Team, where he spends most of his time testing mobile apps and their backends trying to circumvent their security mechanisms. Besides pentesting he also does research in the area of iOS and Android platforms.