| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Description: BYOD is not a new concept. From contractor
laptops to an employee’s game console in the break room, a compromised device in
the corporate environment can lead to all sorts of bad things. In this talk we
will look at the unique threats that BYOD for mobile devices brings to the
table. The most security conscious corporations are deploying the latest devices
and policies to stop attackers from breaching the perimeter and if they do to
stop data exfiltration. We will discuss how mobile devices on a corporate
network and/or handling company data undermines these efforts. We will look at
multiple mobile platforms gathering sensitive information, attacking other
devices such as other mobile devices, servers, and workstations, and using out
of band communication to perform data exfiltration and communicate with internal
devices. Multiple live demo scenarios will be shown and some useful code for
pentesters will be released.
Recorded at AIDE 2013
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast