There’s An App For That – Pen Testing Mobile Devices
This webinar begins with a discussion of the resources that a mobile phone provides to a hacker. These include persistent internet connections which provide an entry point to nearby networks and a low profile which assists in evading physical security. Next, it covers the construction of a proof of concept model. Using the model, the presentation will then illustrate practical threats posed by smartphones, including a targeted cyber attack/penetration test.
Anyone involved with the use of mobile devices in their environments or in pen testing work will benefit from this webinar.