ShadowOS: Modifying the Android OS for Mobile Application Testing

  • Thursday, 23 July, 2015 | 11.15 – 12.00 hrs | Peony Room 4405

View all Sessions

Most penetration testers know the headaches of testing mobile applications. Challenges like certificate pinning and wondering what files are being written to the device while the app is in use. Since Android is open source, you create your own custom OS that takes the guess work out of your assessment. By doing this, you can monitor HTTP/HTTPS traffic, SQL Lite queries, file access and more.


This document was retrieved from on Sun, 18 Aug 2019 07:55:56 -0400.