Torrent details for "Offensive Mobile Reversing and Exploitation - BlackHat 2021" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
38.8 GB
Info Hash:
A3956F60077C6B0B998BCD1C30CFDD45C7A1EDB5
Added By:
Added:
Sept. 13, 2025, 3:31 p.m.
Stats:
|
(Last updated: Sept. 13, 2025, 3:36 p.m.)
| File | Size |
|---|---|
| ARM-Solutions.zip | 6.1 MB |
| AntiDebug.ipa | 29.2 KB |
| Day1.zip | 36.1 MB |
| Day2.zip | 106.0 MB |
| Day4-slides.zip | 14.3 MB |
| KernelSetupGuide.pdf | 1.0 MB |
| CustomPhone1 hide01.ir.ova | 3.1 GB |
| MobileLabVM-VBox hide01.ir.ova | 17.2 GB |
| hide01.ir.txt | 23 bytes |
| Password.txt | 23 bytes |
| PreCourse.zip | 1.3 GB |
| Day 01.mp4 | 3.2 GB |
| Day 02.mp4 | 3.6 GB |
| Day 03.mp4 | 4.3 GB |
| Day 04.mp4 | 4.5 GB |
| SetupInstructions.mov | 187.8 MB |
| Viscosity Installer 1.10.2.exe | 20.3 MB |
| day3-slides.zip | 59.6 MB |
| hide01.ir.txt | 23 bytes |
| vulnapps_pass_androidtrainingpassword.zip | 1.1 GB |
Name
DL
Uploader
Size
S/L
Added
NOTE
SOURCE: Offensive Mobile Reversing and Exploitation - BlackHat 2021
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Offensive Mobile Reversing and Exploitation This course is designed to introduce beginners as well as advanced security enthusiasts to the world of mobile security using a fast-paced learning approach through intensive hands-on labs. The class starts with a basic introduction to the ARM instruction set and an intro to reverse engineering before moving on to the internals of iOS and Android. We then discuss some of the latest exploitation techniques using real-world bugs (e.g., voucher_swap for iOS 12) followed by a walkthrough of how jailbreaks are written. We also discuss some of the common vulnerability types (Heap Overflows, Use-after-free, Uninitialized Stack variable, Race conditions). The training then moves on to application security and is based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2 written by the authors of this course and a broad range of other real-world applications. Slides and detailed documentation on the labs will be provided to the students for practice after the class
×


