Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise
Last updated
Last updated
Company
General Terms and ConditionsEnjoy the ultimate threat modeling knowledge sharing refined through insights from hundreds of sessions with mobile security experts and shared with many CTOs, CISOs, and senior mobile developers who develop for Android, iOS, React Native, and Flutter.
It's ideal for team training workshops as a practical guide to better securing mobile apps and backend APIs, offering actionable insights.
Threat Modeling
TOFU (Trust On First Use)
App and Device Enrollment
Detection, Monitoring, and Security
It focuses on the most exploitable threat vectors, including
Session Hijacking,
Token Hijacking,
Rooting and Jailbreaking (Magisk),
App Impersonation,
App Tampering,
App Cloning,
App Repackaging,
Dynamic Hooking (Frida),
Reverse Engineering and respective prevention and remediation approaches like a RASP.
presented by Tomas Soukal.