Nytro Posted October 31, 2013 Report Posted October 31, 2013 Louisville Infosec 2013 - Attacking Ios Applications - Karl Fosaaen Description: This presentation will cover the basics of attacking iOS applications (and their back ends) using a web proxy to intercept, modify, and repeat HTTP/HTTPS requests. From setting up the proxy to pulling data from the backend systems, this talk will be a great primer for anyone interested in testing iOS applications at the HTTP protocol level. There will be a short (2 minute) primer on setting up the intercepting proxy, followed by three practical examples showing how to intercept data headed to the phone, how to modify data heading to the application server, and how to pull extra data from application servers to further an attack. All of these examples will focus on native iOS apps (Game Center and Passbook) and/or functionality (Passbook Passes).Karl is a senior security consultant at NetSPI. This role has allowed Karl to work in a variety of industries, including financial services, health care, and hardware manufacturing. Karl specializes in network and web application penetration testing. In his spare time, Karl helps out as an OPER at THOTCON and a swag goon at DEF CON.For More Information please visit : - Louisville Metro InfoSec - Theme: Mobile SecurityLouisville Infosec 2013 Videos Sursa: Louisville Infosec 2013 - Attacking Ios Applications - Karl Fosaaen Quote