Announcement

Collapse
No announcement yet.

Demo Lab - Mobile Security Framework - MobSF

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Demo Lab - Mobile Security Framework - MobSF



    Target Audience: Mobile, AppSec

    Short Abstract (What is your tool, what does it do?): Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

    Detailed Explanation of Tool: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing.

    Short Developer Bio: Ajin Abraham is a Security Engineer with 7+ years of experience in Application Security and Offensive Security Research. He is passionate on developing new and unique security tools. Some of his contributions to Hacker's arsenal include OWASP Xenotix XSS Exploit Framework, Mobile Security Framework (MobSF), Droid Application Fuzz Framework (DAFF), NodeJsScan etc to name a few. He has been invited to speak at multiple security conferences including ClubHack, Nullcon, OWASP AppSec Eu, OWASP AppSec AsiaPac, BlackHat Europe, Hackmiami, Confidence, BlackHat US, BlackHat Asia, ToorCon, Ground Zero Summit, Hack In Paris, Hack In the Box, c0c0n and PHDays.

    Any scheduling requirements?: No
    Any equipment needs?: No
    PGP key: dtangent@defcon.org valid 2020 Jan 15, to 2024 Jan 01 Fingerprint: BC5B CD9A C609 1B6B CD81 9636 D7C6 E96C FE66 156A

  • #2
    Originally posted by Dark Tangent View Post




    Target Audience: Mobile, AppSec

    Short Abstract (What is your tool, what does it do?): Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

    Detailed Explanation of Tool: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing.

    Short Developer Bio: Ajin Abraham is a Security Engineer with 7+ years of experience in Application Security and Offensive Security Research. He is passionate on developing new and unique security tools. Some of his contributions to Hacker's arsenal include OWASP Xenotix XSS Exploit Framework, Mobile Security Framework (MobSF), Droid Application Fuzz Framework (DAFF), NodeJsScan etc to name a few. He has been invited to speak at multiple security conferences including ClubHack, Nullcon, OWASP AppSec Eu, OWASP AppSec AsiaPac, BlackHat Europe, Hackmiami, Confidence, BlackHat US, BlackHat Asia, ToorCon, Ground Zero Summit, Hack In Paris, Hack In the Box, c0c0n and PHDays.

    Any scheduling requirements?: No
    Any equipment needs?: No
    Hi it looks like the file:

    DEF CON Safe Mode - Demo Labs - Ajin Abraham - Mobile App Security Testing with MobSF.mp4

    From:

    https://media.defcon.org/DEF%20CON%2...20demo%20labs/

    Is broken or bugged, where can we find a re-upload? It doesn't play correctly 50% of the time and crashes VLC player or shows only green lines.

    Sincerely appreciate the support, look forward to watching this demo in its entirety.

    EDIT: I found a working version hosted on YouTube: https://www.youtube.com/watch?v=1NIQs82n3nw

    Comment

    Working...
    X