Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise

Enjoy the ultimate threat modeling knowledge sharing refined through insights from hundreds of sessions with mobile security experts and shared with many CTOs, CISOs, and senior mobile developers who develop for Android, iOS, React Native, and Flutter.

It's ideal for team training workshops as a practical guide to better securing mobile apps and backend APIs, offering actionable insights.

  • Threat Modeling

  • TOFU (Trust On First Use)

  • App and Device Enrollment

  • Detection, Monitoring, and Security

It focuses on the most exploitable threat vectors, including

  • Session Hijacking,

  • Token Hijacking,

  • Rooting and Jailbreaking (Magisk),

  • App Impersonation,

  • App Tampering,

  • App Cloning,

  • App Repackaging,

  • Dynamic Hooking (Frida),

  • Reverse Engineering and respective prevention and remediation approaches like a RASP.

presented by Tomas Soukal.

Last updated