This course will cover both Android and iOS operating systems and will address all core-level binary vulnerabilities and application-level vulnerabilities, some operating system-level vulnerabilities such as Use After Free that occur in different drivers. The data will be reviewed and evaluated, as well as how to operate and bypass the operating system defense mechanisms that are implemented on ARM processors. Other vulnerabilities that occur at the application level will also be addressed.
Web Penetration Testing
There are no reviews yet.