The Making of: The Good, The Bad and The Ugly
- Raul Siles
- Wednesday, November 18th, 6:00pm - 7:00pm
Mobile devices are threaten by risky, but very common, user behaviours Do you install third-party apps in your mobile device‚¶ so that it becomes a real smartphone?, closed integration with the manufacturer platform Did you create an Apple or Google or Microsoft account when the mobile device was configured? and technical vulnerabilities Do you have the latest and greatest version of your mobile operating system? All these scenarios significantly increase their attack exposure, opening the door to serious device platform compromises, the information they contain, the various user credentials, and as a result, to all the data available in the associated remote services, inside the corporate environment or "in the cloud". What is the best way to understand this trio than through a live attack scenario targeting Android devices?
During the SANS London in the Summer 2015 conference we enjoyed the public premiere of the "Three Modern Mobile Threats: The Good, the Bad and the Ugly‚ presentation. This making-of presentation provides the backstage technical details of how the attack was designed and executed.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
Monday, November 16
Tuesday, November 17
|Clean-Up in Datacentre Aisle 7||Steve Armstrong||Tuesday, November 17th, 6:00pm - 7:00pm||SANS@Night|
|How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...||Bryce Galbraith||Tuesday, November 17th, 7:00pm - 8:00pm||SANS@Night|
Wednesday, November 18
|The Making of: The Good, The Bad and The Ugly||Raul Siles||Wednesday, November 18th, 6:00pm - 7:00pm||SANS@Night|
|Hunting Your Adversary - How to Operate and Leverage an Incident Response Hunt Team||Rob Lee||Wednesday, November 18th, 7:00pm - 8:00pm||SANS@Night|
Thursday, November 19
|Secure at the (Software) Source||Pieter Danhieux||Thursday, November 19th, 6:00pm - 7:00pm||SANS@Night|
|Dissecting the Latest and Greatest Malware Attacks||Jess Garcia||Thursday, November 19th, 7:00pm - 8:00pm||SANS@Night|