Corellium Live:
Level Up Your Mobile Pentest Skills

When:
Tuesday, October 21, 2025 2pm – 5pm workshop
Happy Hour and Topgolf game to follow
Where:
Topgolf The Colony 3760 Blair Oaks Dr.
The Colony, TX 75056
  • Days
  • Hours
  • Minutes
  • ImpossibleDevice_1x

    Workshop Overview

    Our mobile application security testing workshop is built for professional pentesters ready to elevate their craft. This hands-on session puts you in the driver’s seat with Corellium’s virtual device platform, giving you the tools to dissect iOS and Android apps with precision. The session covers core mobile pentesting practices including local storage analysis, network traffic interception, runtime manipulation and reverse engineering all through a mix of lecture, demos and a hands-on CTF challenge. 

    Boost your expertise and earn valuable CPE credits while attending!

    Seats are limited.

    Headline about the Sponsors

    Who Should Attend?

    Designed for penetration testers, security researchers, red and blue team members and mobile developers who thrive on exposing exploitable flaws, this workshop delivers practical, high-impact techniques. You’ll leave equipped to handle the common mobile app security challenges, from identifying insecure data storage to manipulating runtime behavior on demand.

     

    Registration

    Secure your spot now for our FREE upcoming workshop on OCTOBER 21 (2pm-5pm)

    Seats are limited

    Registration is subject to approval

    Register now for our free workshop

    Key Learning Objectives

    By the end of the workshop, participants will be able to:

    Setup a virtual mobile security lab
    Create and launch iOS and Android devices across various versions (Jailbroken and Rooted)
    Install and configure essential security tools (Frida, Objection, Burp, etc)

    Test Local Data Storage Vulnerabilities
    Identify insecure file system storage
    Check iOS keychain for sensitive values
    Use objection for runtime inspection and modification

    Analyze Network Traffic
    Configure proxies with virtual devices
    Intercept and analyze API calls
    Identify and bypass network level security controls

    Apply Runtime Instrumentation & Reversing Basics
    Use Frida to bypass root/jailbreak detection
    Hook into functions for dynamic testing
    Understand when and why reversing binaries is useful

    Practice Through Challenges
    Solve real-world style exercises in a mini CTF
    Learn to apply techniques under time constraints

     

    Tools Required


    Hardware Requirements

    Participants will require a laptop with at least 8GB of RAM running a modern 64bit OS, with at least 20GB of free space after installing dependencies from the Tools Used section. 

    NOTE: Please bring your laptop’s charger.