# Hacking and protection of Mobile Apps and backend APIs | 2024 Talsec Threat Modeling Exercise

Enjoy the ultimate threat modeling knowledge sharing refined through insights from hundreds of sessions with mobile security experts and shared with many CTOs, CISOs, and senior mobile developers who develop for Android, iOS, React Native, and Flutter.

{% embed url="<https://www.youtube.com/embed/a29WuY7cAJ8?si=O3GvYamv8FR_P5_g>" %}

It's ideal for team training workshops as a practical guide to better securing mobile apps and backend APIs, offering actionable insights.

* Threat Modeling
* TOFU (Trust On First Use)
* App and Device Enrollment
* Detection, Monitoring, and Security

It focuses on the most exploitable threat vectors, including

* Session Hijacking,
* Token Hijacking,
* Rooting and Jailbreaking (Magisk),
* App Impersonation,
* App Tampering,
* App Cloning,
* App Repackaging,
* Dynamic Hooking (Frida),
* Reverse Engineering and respective prevention and remediation approaches like a RASP.

presented by Tomas Soukal.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.talsec.app/appsec-articles/articles/hacking-and-protection-of-mobile-apps-and-backend-apis-or-2024-talsec-threat-modeling-exercise.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
