Watch Corellium’s Brian Robison and Steven Smiley, show how Corellium’s virtualization platform removes the limitations of using physical devices to pentest iOS apps for mobile security threats.
Learn more about virtualization here:
In this hour-long video, watch our experts
use various pentesting and reverse engineering tactics to discover vulnerabilities in data-at-rest and data-in-motion.
0:00 Intro
5:11 iOS security research challenges
7:40 Corellium virtual hardware platform
9:20 iOS pentesting basics
10:30 Walkthrough of Corellium Cafe
15:02 Insecure data storage
24:32 iOS application databases
31:08 Insecure communication
41:45 Common misconfigurations
47:26 Bypassing security controls
48:59 Reverse engineering
55:32 Thank you and contact information
#MobileSecurity #MalwareDetection #PenTesting #PenetrationTesting #SecurityVulnerabilities #MobileAppSec #Virtualization #VirtualHardware #Corellium #ArmVirtualization #iOS
[ad_2]
source