In this hands-on session, I will introduce the project and highlight the roadmap and its history. I will highlight some of the key binary risks that this project addresses (reverse engineering, method swizzling, etc.). Participants will use jailbroken mobile devices / mac workstations (provided by me) to perform actual binary attacks.
Objectives: 1. Understand what the project is about; 2. Perform actual attacks on jailbroken devices; 3. Explore project contribution ideas; 4. Develop relevant mobile attack vectors
Contact: Jonathan Carter jonathan.carter@owasp.org