This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecUSA 2017 Developer Summit"
(Tag: Visual edit) |
(Tag: Visual edit) |
||
| Line 9: | Line 9: | ||
<br> | <br> | ||
There is no charge to attend the Developer Summit, so come join us! We do ask that you [https://docs.google.com/spreadsheets/d/13Bcus3CXcBbBmnbFlbZN0i08tXpCJJBre026s7c1vWQ/edit#gid=0 SIGN UP] so we have an estimated headcount to be sure we have enough space and food.</div> | There is no charge to attend the Developer Summit, so come join us! We do ask that you [https://docs.google.com/spreadsheets/d/13Bcus3CXcBbBmnbFlbZN0i08tXpCJJBre026s7c1vWQ/edit#gid=0 SIGN UP] so we have an estimated headcount to be sure we have enough space and food.</div> | ||
| − | <br>=== | + | <br>= '''AGENDA''' = |
| + | |||
| + | [[File:Computer_coding_image.jpeg|link=https://www.owasp.org/index.php/File:Computer_coding_image.jpeg]] | ||
| + | |||
| + | Day 1: | ||
| + | |||
| + | Date: Tuesday, September 19, 2017 | ||
| + | |||
| + | Time: 9am | ||
| + | |||
| + | Location: | ||
| + | |||
| + | Presenter: | ||
| + | |||
| + | [[File:Computer_image.jpeg|link=https://www.owasp.org/index.php/File:Computer_image.jpeg]] | ||
| + | |||
| + | '''Day 2: Full Day Session''' | ||
| + | |||
| + | Date: Wednesday, September 20, 2017 | ||
| + | |||
| + | Time: 9am-4pm | ||
| + | |||
| + | Location: | ||
| + | |||
| + | Presenter: Swaroop Yermalkar | ||
| + | |||
| + | '''Extreme iOS App Exploitation, Defense and ARM Exploitation''' | ||
| + | |||
| + | Detailed training contents: <nowiki>https://goo.gl/swp7F8</nowiki> iOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applications or on the system could mean that an attacker can get access to the device and retrieve sensitive information. This training will show you how to conduct a wide range of penetration tests on iOS applications to uncover vulnerabilities and strengthen the system from attacks. Extreme iOS App Exploitation, Defense and ARM Exploitation is a 14 hrs session which will help you conduct end to end pentesting of iOS Applications and will also help you to understand the security measures which needs to be taken. This training will also have CTF challenge where attendees will use their skills learnt in session. To attend this hands-on session, all you have to do is bring your macbook with xcode installed on it. | ||
| + | |||
| + | '''What will be discussed?''' | ||
| + | |||
| + | Module 1: Introducing iOS App Security | ||
| + | * iOS security model | ||
| + | * App Signing | ||
| + | * App Sandboxing | ||
| + | * App Provisioning | ||
| + | * Changes in iOS 8/9/10 | ||
<div class="center" style="width: auto; margin-left: auto; margin-right: auto;">More details and the agenda are coming soon! | <div class="center" style="width: auto; margin-left: auto; margin-right: auto;">More details and the agenda are coming soon! | ||
Questions? Please submit them [https://www.tfaforms.com/308703 here]. | Questions? Please submit them [https://www.tfaforms.com/308703 here]. | ||
</div> | </div> | ||
Revision as of 19:30, 11 July 2017
If you have an interesting topic and would like to volunteer to host a training session, please SUBMIT HERE. There are limited funds available to help offset the selected presenters travel and one night hotel accommodation. The Call for Presenters will close on July 14, 2017. Individuals will be notified on or before July 21, 2017 if their session was chosen. Please note: a conference ticket is NOT included, however you may purchase one separately.
= AGENDA =
Day 1:
Date: Tuesday, September 19, 2017
Time: 9am
Location:
Presenter:
Day 2: Full Day Session
Date: Wednesday, September 20, 2017
Time: 9am-4pm
Location:
Presenter: Swaroop Yermalkar
Extreme iOS App Exploitation, Defense and ARM Exploitation
Detailed training contents: https://goo.gl/swp7F8 iOS has become one of the most popular mobile operating systems with more than 1.4 million apps available in the iOS App Store. Some security weaknesses in any of these applications or on the system could mean that an attacker can get access to the device and retrieve sensitive information. This training will show you how to conduct a wide range of penetration tests on iOS applications to uncover vulnerabilities and strengthen the system from attacks. Extreme iOS App Exploitation, Defense and ARM Exploitation is a 14 hrs session which will help you conduct end to end pentesting of iOS Applications and will also help you to understand the security measures which needs to be taken. This training will also have CTF challenge where attendees will use their skills learnt in session. To attend this hands-on session, all you have to do is bring your macbook with xcode installed on it.
What will be discussed?
Module 1: Introducing iOS App Security
- iOS security model
- App Signing
- App Sandboxing
- App Provisioning
- Changes in iOS 8/9/10
Questions? Please submit them here.


