Android App Hacker’s Toolbox

button-icon-arrow-right
button-icon-arrow-left

button-icon-arrow-leftBack

Event

Android app hacker’s toolbox

15 November 2018

Bristol

Added 01-Jan-1970

• 6:00 pm - Social
• 6:30 pm - OWASP update
• 6:35 pm - Presentation 1: The Android app hacker’s toolbox - Iain Baughen
• 7:30pm - Presentation 2: Red Team tactics against a windows enterprise lock down network infrastructure (Part 2) - Sadi Zane, Raytheon

Presentation 1: The Android app hacker’s toolbox

Abstract: What makes an Android app secure? How can you test your own Android apps? This talk takes a look at a range of free tools that can be used for static and dynamic analysis, code review and and reverse engineering. There will be live app hacking!

Bio: Iain has 12 years' experience as a software engineer and has recently made a move into the security field. Working for a Bristol software company his current role involves a mix of development, pen testing web and mobile applications and code analysis

Presentation 2: Red Team tactics against a windows enterprise lock down network infrastructure (Part 2)

Abstract:
This talk demonstrate some of the lesser known advance red team tricks techniques against a typical enterprise network setup:
- Kerberos Authentication
- Kerberos Service accounts
- Active directory user delegation/rights
- Active directory secrets/ password objects
- Living off the land and (Windows Built in tools)
- Pivoting network with kerberos ticket

Bio: Sadi, a Red Team Security Consultant working for Raytheon (ACS) Advanced Cyber Security Team, delivers advanced security red team projects. Qualified OSCP Offensive Security Certified Professional and check team member.

Top