Abstract

This talk is about performing iOS application runtime analysis. We will hook debuggers to application process and modify the application's behaviour to bypass validations. We will explore different debuggers and techniques including command line and GUI tools for runtime analysis.

Speaker

Swaroop Yermalkar

Swaroop Yermalkar works as a Security Engineer and his work includes threat modelling, security research and the assessment of IoT devices, healthcare products, web applications, networks, and Android, iOS applications.

He is OWASP iGoat Project leader (https://www.owasp.org/index.php/OWASPiGoatTool_Project) and also author of popular iOS security book ‘Learning iOS Penetration Testing’, by Packt Publishing. He is also one of the top security researchers worldwide, working with Cobalt.io (https://app.cobalt.io/swaroopsy), Synack.inc.

He has been invited to give talks and training at various security conferences, such as Hacks In Taiwan (HITCON), Europeansec, GroundZero, c0c0n, 0x90, DefconLucknow, and GNUnify. He has been acknowledged by Microsoft, Amazon, eBay, Etsy, Dropbox, Evernote, Simple banking, iFixit, and many more for reporting high-severity security issues in their mobile apps.

He is an active member of NULL, an open security community in India, and is a contributor to the regular meetups and Humla sessions at the Pune, Bengaluru chapter. He holds various information security certifications, such as OSCP, OSWP, SLAE and CEH. He has written articles for clubHACK magazine and also authored a book, An Ethical Guide to Wi-Fi Hacking and Security.

Timing

Starts at Saturday September 10 2016, 09:30 AM. The sessions runs for about 1 hour.

Resources