About
As the Director of Security Engineering at Security Innovation, I provide managerial…
Activity
7K followers
Experience
-
Security Innovation
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Education
-
Ramrao Adik Institute of Technology,University of Mumbai
-
-
-
-
-
-
-
Licenses & Certifications
-
-
-
Hands-On Hardware Hacking
DakotaCon - Joe Grand
Issued -
-
-
-
-
IPSolutions certified CCNA
IPSolutions
Issued -
Advance Diploma in Software Engineering
CMIT
-
Certified in RedHat Linux
Aptech Computers
Publications
-
Demystifying IoT Attack Vectors
Security Innovation Blog
See publicationBlog post that explains the various attack vectors that can be used to compromise an IoT device. Also includes a IoT Tipsheet that can be used to secure your IoT devices.
-
OWASP Mobile Risks 2014 vs. OWASP Mobile 2016 RC
Security Innovation Blog
See publicationIn March of this year, OWASP released their 2016 edition of the Mobile Top Ten. Now that organizations have had some time to get acclimated to it, I wanted to provide some of my thoughts on it.
-
QuadRooter: The 4-Headed Monster That Threatens 900 Million Android Users
Security Innovation Blog
See publicationA detailed account on QuadRooter - that is a collection of four exploits in Qualcomm's popular graphics and media chipset, which is in more than 900 million mobile devices globally.
-
Jailbreaking your iPhone: Worth the Security Risk?
Security Innovation Blog
See publicationWhat are the Benefits and Risks Gained by Jailbreaking an iOS device.
-
The Blessing and Curse of Apple Security
Security Innovation Blog
See publicationA lot has been written about whether Apple should comply with the recently publicized FBI demands surrounding the San Bernardino attack last year. However, I’m going to avoid the political side of the debate and focus on the technology instead via this article.
-
Android vs. iOS: Security Comparison
Palisade : Application Security Intelligence
See publicationSmartphones are enjoying an ever-increasing popularity due to the technological advancement taking place on a day-to-day basis and have become a basic need for users, just as a desktop computer. In this article, we shall discuss some of the differences in the security aspects of Google’s Android and Apple’s iOS platforms.
-
Demystifying The Android Malware
Multiple International Security journals and magazines
See publicationEarlier, cybercriminals around the world used to create programs that could create havoc on your network and steal important data. But, now with the immense growth of mobile technology every individual needs to not only worry about the device being stolen but also of malwares that effect their mobile device.
In this paper, we are going to take you through the various phases so as to understand how and what these malwares are exactly made up of. First of all, we will start with discussing the…Earlier, cybercriminals around the world used to create programs that could create havoc on your network and steal important data. But, now with the immense growth of mobile technology every individual needs to not only worry about the device being stolen but also of malwares that effect their mobile device.
In this paper, we are going to take you through the various phases so as to understand how and what these malwares are exactly made up of. First of all, we will start with discussing the background of Android and then move on to the basics of how an Android package architecture is developed.
We shall then analyze an android malware in complete detail. In the end we will discuss on the steps to counter these kinds of malware attacks. -
Penetration Testing With Metasploit Framework
Multiple International security journals and magazines
See publicationToday security is just an illusion. However safe you think you are, you might just be wrong. Penetration testing of your web application helps you know the vulnerability in your application and you might as well try to find out solutions for it once you know the vulnerability. Metasploit is the leading tool used by penetration testers today which helps test your application security and save you from possible intruders and attacks.
This paper tried to explain how Metasploit framework…Today security is just an illusion. However safe you think you are, you might just be wrong. Penetration testing of your web application helps you know the vulnerability in your application and you might as well try to find out solutions for it once you know the vulnerability. Metasploit is the leading tool used by penetration testers today which helps test your application security and save you from possible intruders and attacks.
This paper tried to explain how Metasploit framework can be used by penetration testers to exploit flaws in the web application which could be really difficult to find if done manually. -
Route Optimized Ad-Hoc On-Demand Distance Vector Routing Protocol
Multiple International security journals and magazines
See publicationWe suggest a novel approach to constrain route request broadcast which by means of route optimization using cache mechanism.
The performance of AODV has been modified by using route optimizing technique and thus called Route Optimised AODV (RO-AODV). This protocol optimizes AODV to perform effectively in terms of routing overhead, power consumption and delay during high load. -
Social Engineering - The Human Factor
Multiple International Journals and Magazines
See publicationEarlier, cybercriminals around the world used to create programs that could create havoc on your network and steal important data and the Security Consultants would try and block every mode of access for these attackers.
But, now with the immense growth of society, Merely trying to prevent infiltration on a technical level and ignoring the physical-social level, cent percent security can never be achieved. To ensure complete security of an organization from all kinds of internal and…Earlier, cybercriminals around the world used to create programs that could create havoc on your network and steal important data and the Security Consultants would try and block every mode of access for these attackers.
But, now with the immense growth of society, Merely trying to prevent infiltration on a technical level and ignoring the physical-social level, cent percent security can never be achieved. To ensure complete security of an organization from all kinds of internal and external factors, the security consultant must have complete knowledge of the Social Engineering cycle, the techniques that can be used by an attacker and the counter-measures to reduce the likelihood of success of the attack.
In this paper we are going to take you through the various phases so as to understand what is Social Engineering, Social Engineering Lifecycle, the various Techniques used in Social Engineering attack with detailed examples and then finally conclude with the counter-measures to protect against each of the Social Engineering attack techniques.
Projects
-
Detailed Guide to Hacking iOS Applications
See projectA comprehensive guide created to give hackers, developers and managers alike with an in-depth knowledge about the different kinds of iOS hacking tools and techniques. Explains manual as well as automated techniques of mobile application exploitation.
-
Android-InsecureBankv2
-
See projectThis is a major update to one of my previous projects - "InsecureBank". This vulnerable Android application is named "InsecureBankv2" and is made for security enthusiasts and developers to learn the Android insecurities by testing this vulnerable application. Its back-end server component is written in python. The client component i.e. the Android InsecureBank.apk can be downloaded along with the source. The list of vulnerabilities that are currently included in this release are:
…This is a major update to one of my previous projects - "InsecureBank". This vulnerable Android application is named "InsecureBankv2" and is made for security enthusiasts and developers to learn the Android insecurities by testing this vulnerable application. Its back-end server component is written in python. The client component i.e. the Android InsecureBank.apk can be downloaded along with the source. The list of vulnerabilities that are currently included in this release are:
Flawed Broadcast Receivers
Intent Sniffing and Injection
Weak Authorization mechanism
Local Encryption issues
Vulnerable Activity Components
Root Detection and Bypass
Insecure Content Provider access
Insecure Webview implementation
Weak Cryptography implementation
Application Patching
Sensitive Information in Memory
Insecure Logging mechanism
Android Pasteboard vulnerability
Application Debuggable
Android keyboard cache issues
Android Backup vulnerability
Runtime Manipulation
Insecure SDCard storage
Insecure HTTP connections
Parameter Manipulation
Hardcoded secrets
Username Enumeration issue
Developer Backdoors
Weak change password implementation
Below are some of the other vulnerabilities that I am working on currently - and will be added as soon as I make sure that it does not break any of the other existing features:
Weak Pseudo Random Implementation
Path Traversal
Local SQL Injection
Intent based Denial-Of-Service - SMS
LockScreen Bypass
Location Spoofing
Dead Code
Honors & Awards
-
Invited as Trainer at Black Hat USA 2025, 2024, 2023, 2022, 2021, 2020 on Offensive Mobile Exploitation & Reversing
Black Hat USA
The class starts with a basic introduction to the ARM instruction set and calling conventions followed by some reverse engineering exercises. We then learn how to write simple exploits for the ARM64 environment. Next, we move to Mobile browser security, understand some of the browser mitigations followed by writing some simple exploits for the mobile browser. We then cover iOS and Android internals in further detail. We then discuss some of the exploitation techniques using real-world…
The class starts with a basic introduction to the ARM instruction set and calling conventions followed by some reverse engineering exercises. We then learn how to write simple exploits for the ARM64 environment. Next, we move to Mobile browser security, understand some of the browser mitigations followed by writing some simple exploits for the mobile browser. We then cover iOS and Android internals in further detail. We then discuss some of the exploitation techniques using real-world vulnerabilities (e.g., voucher_swap, checkm8, etc) followed by a walkthrough of how jailbreaks are written. We also discuss some of the common vulnerability types (Heap Overflows, Use-after-free, Uninitialized Stack variable, Race conditions).
The training then moves on to application security based on exploiting the Damn Vulnerable iOS app, Android-InsecureBankv2, and InsecurePass application written by the authors of this course in addition to a broad range of other real-world applications. We then cover a variety of mitigations deployed in real-world apps and discuss how to bypass them.
After the training, attendees will:
- Get an understanding of ARM64 instruction set (including ARM 8.3)
- Understand the Browser Security mitigations on Mobile Devices
- Understand some common vulnerabilities in Mobile Browsers and learn and how to exploit them
- Learn the internals of iOS and Android Kernel along with several Kernel security mitigations
- Understand some of the latest bugs and mitigations (PAC, CoreTrust, PPL, etc)
- Get an intro to some common bug categories UaF, Heap overflow, etc
- Understand how jailbreaks and exploits are written (including iOS 13)
- Reverse engineer iOS and Android binaries (Apps and system binaries)
- Do basic fuzz testing of iOS and Android apps
- Learn how to audit iOS and Android apps for security vulnerabilities
- Understand and bypass anti-debugging and obfuscation techniques
- Get a quick walkthrough on using IDA Pro, Hopper, Frida, etc -
Invited as Trainer at POC2019, on Offensive Mobile Exploitation & Reversing
POC - Seoul, Korea
This course is designed to introduce beginners as well as advanced security enthusiasts to
the world of mobile security using a fast-paced learning approach through intensive
hands-on labs. The class starts with a basic introduction to the ARM instruction set and an
intro to reverse engineering before moving on to the internals of iOS and Android. We then
discuss some of the latest exploitation techniques using real-world bugs (e.g.,
voucher_swap for iOS 12) followed by a…This course is designed to introduce beginners as well as advanced security enthusiasts to
the world of mobile security using a fast-paced learning approach through intensive
hands-on labs. The class starts with a basic introduction to the ARM instruction set and an
intro to reverse engineering before moving on to the internals of iOS and Android. We then
discuss some of the latest exploitation techniques using real-world bugs (e.g.,
voucher_swap for iOS 12) followed by a walkthrough of how jailbreaks are written. We
also discuss some of the common vulnerability types (Heap Overflows, Use-after-free,
Uninitialized Stack variable, Race conditions).
The training then moves on to application security and is based on exploiting Damn
Vulnerable iOS app, Android-InsecureBankv2, InsecurePass written by the authors of this course and a
broad range of other real-world applications. Slides and detailed documentation on the
labs will be provided to the students for practice after the class.
After the training, the attendees will:
- Get an understanding of ARM64 instruction set (including ARM 8.3)
- Learn the fundamentals of iOS IPC (XPC, Mach)
- Get an intro to some common bug categories UaF, Heap overflow, etc
- Understand how jailbreaks and exploits are written (including iOS 12)
- Reverse engineer iOS and Android binaries (Apps and system binaries)
- Be able to audit iOS and Android apps for security vulnerabilities
- Understand some of the latest bugs and mitigations (PAC, CoreTrust, Code Signing)
- Understand and bypass anti-debugging and obfuscation techniques
- Get a quick walkthrough on using IDA Pro, Hopper, Frida, etc -
Invited as Trainer at Black Hat USA 2019, on Offensive Mobile Exploitation & Reversing
Black Hat USA 2019
Sold out class that was designed to introduce beginners as well as advanced security enthusiasts to the world of mobile security using a fast-paced learning approach through intensive hands-on labs. The class started with a basic introduction to the ARM instruction set and an intro to reverse engineering before moving on to the internals of iOS and Android. We then discussed some of the latest exploitation techniques using real-world bugs (e.g., voucher_swap for iOS 12) followed by a…
Sold out class that was designed to introduce beginners as well as advanced security enthusiasts to the world of mobile security using a fast-paced learning approach through intensive hands-on labs. The class started with a basic introduction to the ARM instruction set and an intro to reverse engineering before moving on to the internals of iOS and Android. We then discussed some of the latest exploitation techniques using real-world bugs (e.g., voucher_swap for iOS 12) followed by a walkthrough of how jailbreaks are written. We also discussed some of the common vulnerability types (Heap Overflows, Use-after-free, Uninitialized Stack variable, Race conditions).
The training then moved on to application security and is based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2, Android-InsecurePass written by the authors of this course and a broad range of other real-world applications. -
Invited as Trainer at Black Hat USA 2018, on Offensive Mobile Exploitation & Reversing
Black Hat USA 2018
Sold-out class on the latest Android and iOS exploitation techniques. Updated course with hands-on for all of the iOS and Android vulnerabilities and attacks.
-
Invited as Trainer at FS-ISAC 2018 Annual Summit - Florida, on Introduction to Cyber Ranges
FS-ISAC 2018 Annual Summit
Ran an application security cyber range training to enable developers and security professionals in the financial services industry to stop hackers in their tracks by building more secure code.
Training was conducting using Security Innovation's CMD+CTRL Cyber Range. CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning…Ran an application security cyber range training to enable developers and security professionals in the financial services industry to stop hackers in their tracks by building more secure code.
Training was conducting using Security Innovation's CMD+CTRL Cyber Range. CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning by doing" teams need to protect the enterprise. -
Invited as Trainer at Hackfest Canada 2017, on Mobile Application Exploitation
HackFest
A 3 day handson class teaching manual as well as automated techniques for exploiting Mobile Applications. Covers testing on Jailbroken/Rooted as well as on non-Jailbroken devices.
-
Invited as Trainer at Black Hat USA 2017, on Offensive Mobile Application Exploitation
Black Hat USA 2017
-
Invited as Trainer at Def Con USA 2017, on Practical BLE Exploitation for Internet of Things
Def Con 25
The Practical BLE Exploitation for Internet of Things is a new training class focusing on exploiting the numerous IoT devices using BLE as the medium.
Bluetooth Low Energy (or BLE) is found in most of the popular IoT and smart devices - be it smart home automation, retail, medical devices and more. This class will go through the internals of BLE from a security perspective, and then jump right into how you could interact with BLE devices all the way to taking control over a complete IoT…The Practical BLE Exploitation for Internet of Things is a new training class focusing on exploiting the numerous IoT devices using BLE as the medium.
Bluetooth Low Energy (or BLE) is found in most of the popular IoT and smart devices - be it smart home automation, retail, medical devices and more. This class will go through the internals of BLE from a security perspective, and then jump right into how you could interact with BLE devices all the way to taking control over a complete IoT devices using BLE exploitation techniques.
At the end, we will also look at some of the automation tools and scripts you can use/write in order to make the process much faster - as it's required in a pentest. -
Invited as Trainer at OWASP AppsecEU2017 - Belfast, on Hands-on Mobile Application Exploitation
OWASP AppsecEU2017
After a sold-out class in OWASP Appsec USA 2016, we are bringing an updated version of the course with the latest tools & techniques. Hands-on for all of the iOS and Android vulnerabilities and attacks - on the latest Mobile operating systems.
-
Invited as Trainer at BloomCON USA 2017, on Offensive Android Application Exploitation
BloomCON
An introductory course on how to start attacking Android applications. Includes Threat Modeling, Static Analysis, Dynamic Analysis and Reverse Engineering of real world Android applications.
-
Invited as Trainer at OWASP AppSecUSA 2016, on Mobile Application Exploitation - iOS and Android
OWASP
This will be an introductory course on exploiting iOS and Android applications. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2 and other vulnerable applications that are written by the trainers in order to give an in-depth knowledge about the different kinds of vulnerabilities in an Mobile applications. This course will also discuss how an attacker can compromise a mobile application. After the workshop, the students will be able to successfully pentest…
This will be an introductory course on exploiting iOS and Android applications. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2 and other vulnerable applications that are written by the trainers in order to give an in-depth knowledge about the different kinds of vulnerabilities in an Mobile applications. This course will also discuss how an attacker can compromise a mobile application. After the workshop, the students will be able to successfully pentest and secure applications running on the various operating systems.
The training will also include a CTF challenge in the end where the attendees will use their skills learnt in the training to solve the CTF challenges. -
Invited as Speaker at Demo Labs - Defcon USA 2016, on Android Exploitation using InsecureBankv2
Demo Labs - Defcon USA 2016
Learn Exploiting Android applications using InsecureBankv2.
-
Invited as Trainer at Defcon USA 2016, on Practical Android Application Exploitation
Defcon USA 2016
This will be an detailed course with extensive hands-on on exploiting Android applications. The training will be based on exploiting Android-InsecureBankv2 and other vulnerable applications that are written by the trainer in order to give an in-depth knowledge about the different kinds of vulnerabilities in an Android applications. This course will also discuss how an attacker can compromise a mobile application. After the workshop, the students will be able to successfully pentest and secure…
This will be an detailed course with extensive hands-on on exploiting Android applications. The training will be based on exploiting Android-InsecureBankv2 and other vulnerable applications that are written by the trainer in order to give an in-depth knowledge about the different kinds of vulnerabilities in an Android applications. This course will also discuss how an attacker can compromise a mobile application. After the workshop, the students will be able to successfully pentest and secure applications running on the various operating systems.
The training will also include a CTF challenge in the end where the attendees will use their skills learnt in the training to solve the CTF challenges. -
Invited as Speaker at Arsenal - Black Hat USA 2016, on Android Exploitation using InsecureBankv2
Black Hat USA 2016 - Arsenal
Learn Exploiting Android applications using InsecureBankv2.
-
Invited as Trainer at Black Hat USA 2016, on Offensive Hands-on Internet of Things (IoT) Exploitation
Black Hat USA 2016
The training will cover different varieties of IoT devices, assessing their attack surfaces and writing exploits for them. The 2-day class will be hands-on giving attendees the ability to try things themselves rather than just watching the slides. We will start from the very beginning discussing about the architecture of IoT devices, and then slowly moving to firmware analysis, identifying attack surface, finding vulnerabilities and then finally exploiting the vulnerabilities
-
Invited as Speaker at BruCON - Belgium on PenTest for Mobile Applications!
Mobile Application Exploitation (iOS and Android)
This will be an comprehensive course on exploiting iOS and Android applications. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2 and other vulnerable applications that are written by the trainers in order to give an in-depth knowledge about the different kinds of vulnerabilities in an Mobile applications. This course will also discuss how an attacker can compromise a mobile application. After the workshop, the students will be able to successfully…
This will be an comprehensive course on exploiting iOS and Android applications. The training will be based on exploiting Damn Vulnerable iOS app, Android-InsecureBankv2 and other vulnerable applications that are written by the trainers in order to give an in-depth knowledge about the different kinds of vulnerabilities in an Mobile applications. This course will also discuss how an attacker can compromise a mobile application. After the workshop, the students will be able to successfully pentest and secure applications running on the various operating systems.
The training will also include a CTF challenge in the end where the attendees will use their skills learnt in the training to solve the CTF challenges. -
Acknowledged by United Airlines Security Bug Bounty Program
United Airlines
Received 1 Million Miles for submitting critical security bug in one of the United Airlines services.
-
Invited as Speaker at Black Hat EU 2015 - Amsterdam, on Android - InsecureBankv2
Black Hat
Watch as Dinesh walks you through his new and shiny updated custom application - "Android-InsecureBank" and some other source code review tools, to help you understand some known and some not so known Android Security bugs and ways to exploit them.
This presentation will cover Mobile Application Security attacks that will get n00bs as well as 31337 attendees started on the path of Mobile Application Penetration testing. -
Invited as Speaker at SECoT 2015 - Boston, on Hacking IoT devices
The Security of Things Forum
This was a full day hands-on workshop on Hacking Internet Connected Devices (IoT) and CMD+CTRL which is a capture the flag contest to teach offensive security. In addition to presenting a variety of vulnerable web applications, a specialized hardware hacking module was debuted. It is a series of embedded hardware devices where players can score points by dumping firmware from common microcontrollers and routers, using a logic analyzer to decode unknown protocols, and a variety of other hardware…
This was a full day hands-on workshop on Hacking Internet Connected Devices (IoT) and CMD+CTRL which is a capture the flag contest to teach offensive security. In addition to presenting a variety of vulnerable web applications, a specialized hardware hacking module was debuted. It is a series of embedded hardware devices where players can score points by dumping firmware from common microcontrollers and routers, using a logic analyzer to decode unknown protocols, and a variety of other hardware level attacks.
-
Invited as Speaker at ISSA - Northeastern University, on Practical Android Application Security
ISSA - Northeastern University
Even wondered how different pentesting a Mobile application would be, from a traditional web application? Gone are the days when knowledge of just SQL Injection or XSS could help you land a lucrative high-paying infoSec job. Watch as Dinesh walks you through custom created demo applications and source code review tools, to help you understand some known and some not so known Android Security bugs. This presentation will cover Mobile Application Security ninja tricks that will get n00bs as well…
Even wondered how different pentesting a Mobile application would be, from a traditional web application? Gone are the days when knowledge of just SQL Injection or XSS could help you land a lucrative high-paying infoSec job. Watch as Dinesh walks you through custom created demo applications and source code review tools, to help you understand some known and some not so known Android Security bugs. This presentation will cover Mobile Application Security ninja tricks that will get n00bs as well as 31337 attendees to get started on the path of Mobile Application Penetration testing. Expect to see a lot of demos, tools and of-course fun.
-
Invited as Speaker at BSMCon - Boston on PenTest for Mobile Applications!
BSMCon #3
Expect to see a lot of demos, tools, hacking and a lot of fun.
The presentation focuses on problems of following bad Mobile development practice. During this session, you will learn how to perform a Code Assisted Pentest on Mobile applications and uncover some well-known and some other not so well known security issues. It is far easy to gain a practical knowledge of security vulnerabilities than it is to read about them.
We will use a custom created demo application in addition to…Expect to see a lot of demos, tools, hacking and a lot of fun.
The presentation focuses on problems of following bad Mobile development practice. During this session, you will learn how to perform a Code Assisted Pentest on Mobile applications and uncover some well-known and some other not so well known security issues. It is far easy to gain a practical knowledge of security vulnerabilities than it is to read about them.
We will use a custom created demo application in addition to some other open source mobile applications, to catch security flaws noted in the various hand-held devices. -
Invited as Speaker at OWASP - Boston AppSec Conference on Code Assisted PenTest for Mobile Applications
OWASP BASC 2014 - Boston
The presentation focuses on problems of following bad Mobile development practice. During this session, you will learn how to perform a Code Assisted PenTest on Mobile applications and uncover some well-known and some other not so well known security issues. It is far easy to gain a practical knowledge of security vulnerabilities than it is to read about them.
Watch as Dinesh walks you through custom created demo applications and source code review tools, to catch security flaws noted in…The presentation focuses on problems of following bad Mobile development practice. During this session, you will learn how to perform a Code Assisted PenTest on Mobile applications and uncover some well-known and some other not so well known security issues. It is far easy to gain a practical knowledge of security vulnerabilities than it is to read about them.
Watch as Dinesh walks you through custom created demo applications and source code review tools, to catch security flaws noted in the various hand-held devices. Expect to see a lot of demos, tools, hacking and a lot of fun. -
Part of Adobe Hall of Fame
Adobe Software and Products
Added to Adobe Hall of Fame for finding multiple critical security vulnerabilities in their product.
-
Invited as Trainer at ClubHack 2012 - India, on Securing Mobile applications – Exploits Demystified and Solutions Simplified
ClubHack
Title: Securing Mobile applications – Exploits Demystified and Solutions Simplified
A detailed workshop covering but not restricted to below concepts:
Threat Modeling
Understanding Security Vulnerabilities in Mobile Applications
Detecting Security Vulnerabilities - Introduction to Mobile Security Code Reviews
Scope for Automation in Mobile Security Code Reviews
Designing Secure Mobile Applications
Attendee Takeaways and Key Learning Objectives
An…Title: Securing Mobile applications – Exploits Demystified and Solutions Simplified
A detailed workshop covering but not restricted to below concepts:
Threat Modeling
Understanding Security Vulnerabilities in Mobile Applications
Detecting Security Vulnerabilities - Introduction to Mobile Security Code Reviews
Scope for Automation in Mobile Security Code Reviews
Designing Secure Mobile Applications
Attendee Takeaways and Key Learning Objectives
An overview of Android and iOS Technology
Threat Profile of Android and iOS
Vulnerability Checklist for Android and iOS
Code review approach
Custom Script to Automate Android and iOS source code reviews
Custom Vulnerable Bank Application
Solutions repository
Reference Materials
-
Part of Barracuda Networks Hall of Fame
Barracuda Networks
Added to Barracuda Networks Hall of Fame for finding multiple critical security vulnerabilities in their websites and web services as a part of Barracuda Networks Security Bug Bounty Program.
-
Part of Apple Hall of Fame
Apple Inc.
Acknowledged by Apple for finding critical security vulnerabilities in their products.
-
Invited as Speaker at OWASP AppSecAsiaPac2012 - Sydney on Advanced Mobile Application Code Review Techniques
OWASP AppSecAsiaPac2012 - Sydney
Learn how Mobile experts blend their techniques in order to accelerate code reviews. While reviewing Android or iOS applications, you will love these handy tricks that help in detecting famous and a few not-so-famous flaws.
Using demonstrations and code snippets, we will highlight the benefits of blended techniques in comparison with those of simple scanning or manual testing. You will also learn how to reduce the time taken for review and obtain a ready-to-use checklist. -
Invited as Trainer at OWASP AppSecAsiaPac2012 - Sydney, on Mobile Applications & Security
OWASP AppSecAsiaPac2012 - Sydney
This course covers security tests that are conducted on mobile applications with a focus on iOS and Android platforms.
Students will first learn the basics of mobile applications followed by a brief background of iOS and Android platforms, their security models and an overview of their development basics.
They will then learn how to model a threat profile for mobile applications and then test and debug the mobile applications for security vulnerabilities.
Reading locally…This course covers security tests that are conducted on mobile applications with a focus on iOS and Android platforms.
Students will first learn the basics of mobile applications followed by a brief background of iOS and Android platforms, their security models and an overview of their development basics.
They will then learn how to model a threat profile for mobile applications and then test and debug the mobile applications for security vulnerabilities.
Reading locally stored data in mobiles, setting up a proxy to intercept and test network traffic and reversing Android applications will be a few of the topics discussed. We will also discuss the challenges involved in reversing an iOS application. The course includes examples for both the platforms and sample code snippets will also be provided.
We will also discuss the best practices that have to be followed for secure development of mobile applications. The course would end with a discussion of the OWASP Mobile Top 10 risks. -
Invited as Speaker at National Institute of Bank Management on Operating System Security
National Institute of Bank Management
The purpose of this presentation was to give an overview of:
a) the need for a secure operating system and
b) the high-level design of a secure operating system that can be built and evaluated to the highest assurance levels.
c) discuss the various testcases and audit tests that should be performed so as to validate the security of the deployed architecture.
Recommendations received
3 people have recommended Dinesh
Join now to viewOther similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content