The Hitchhacker's Guide to the Mobile Galaxy
2023-10-14 , Hochschule München - R1.008

The mobile galaxy is dominated by two solar systems: Android and iOS. Grab your towel and embark on a journey through the intricacies of mobile operating systems. Uncover the secrets and vulnerabilities of mobile app planets through static analysis. Ignite the infinite improbability drive and delve deeper with dynamic analysis to gain the skills and knowledge to outwit the Vogons. Establish a Man-in-the-Middle to glide through the network traffic of mobile applications and see them phone home.

In this workshop, not only the Ultimate Question of Life, the Universe, and Everything will be answered but also most of your questions regarding mobile security. Join us on this galactic adventure of becoming a mobile security expert!


The workshop will cover the following topics:

  1. Big Bang of Basics
  2. Adventures on Androids
    • Where Android apps live
    • How Android apps are made
    • How data is stored on Android
    • Android app components
    • Hooking with Frida and Objection
  3. Incidents on iOS
    • How iOS apps are made
    • Where iOS apps live
    • How data is stored on iOS
    • Hooking with Frida and Objection
  4. Meddling in the Middle
    • Establishing a Man-in-the-Middle
    • Bypassing SSL pinning

We will conduct exercises on all topics using virtual devices on Corellium. Participants will need to bring their own laptop wit a virtualization platform installed (e.g. VMware, VirtualBox). A virtual machine with the required tools will be provided at the beginning of the workshop.

Participants should have a basic understanding of Android or iOS (i.e. know what a mobile app is) and be comfortable working with the command line.


Which keywords describe your submission?:

mobile, android, ios, pentesting

See also: Slides

Claudia Ully is part of the pentesting team at NVISO and passionate about raising awareness and enthusiasm for cyber security.​

​Her main area of expertise are web and mobile application security. Apart from spotting vulnerabilities in applications, she enjoys helping and training developers and IT staff to better understand and prevent security issues. She loves coming up with creative ways of making learning more fun and is curious to always learn new things herself.​