Workshop Overview
Our mobile application security testing workshop is built for professional pentesters ready to elevate their craft. This hands-on session puts you in the driver’s seat with Corellium’s virtual device platform, giving you the tools to dissect iOS and Android apps with precision. The session covers core mobile pentesting practices including local storage analysis, network traffic interception, runtime manipulation and reverse engineering all through a mix of lecture, demos and a hands-on CTF challenge.
Boost your expertise and earn valuable CPE credits while attending!
Seats are limited.

Headline about the Sponsors





Who Should Attend?
Designed for penetration testers, security researchers, red and blue team members and mobile developers who thrive on exposing exploitable flaws, this workshop delivers practical, high-impact techniques. You’ll leave equipped to handle the common mobile app security challenges, from identifying insecure data storage to manipulating runtime behavior on demand.
Registration
Secure your spot now for our FREE upcoming workshop on OCTOBER 21 (2pm-5pm)
Seats are limited
Registration is subject to approval
Register now for our free workshop
Key Learning Objectives
By the end of the workshop, participants will be able to:
Setup a virtual mobile security lab
Create and launch iOS and Android devices across various versions (Jailbroken and Rooted)
Install and configure essential security tools (Frida, Objection, Burp, etc)
Test Local Data Storage Vulnerabilities
Identify insecure file system storage
Check iOS keychain for sensitive values
Use objection for runtime inspection and modification
Analyze Network Traffic
Configure proxies with virtual devices
Intercept and analyze API calls
Identify and bypass network level security controls
Apply Runtime Instrumentation & Reversing Basics
Use Frida to bypass root/jailbreak detection
Hook into functions for dynamic testing
Understand when and why reversing binaries is useful
Practice Through Challenges
Solve real-world style exercises in a mini CTF
Learn to apply techniques under time constraints
Tools Required
-
Corellium Cafe:
-
VPN Client
-
Mac OS – Viscosity or Tunnelblick
-
Windows – Viscosity
-
Linux – OpenVPN (sudo apt install openvpn)
-
-
Frida 17 Client: https://frida.re/docs/home/
-
Objection: https://github.com/sensepost/objection
-
DB Browser for SQLite (or other SQLite viewer): https://sqlitebrowser.org/
-
JADX
-
Hopper or Ghidra for iOS reversing
Hardware Requirements
Participants will require a laptop with at least 8GB of RAM running a modern 64bit OS, with at least 20GB of free space after installing dependencies from the Tools Used section.
NOTE: Please bring your laptop’s charger.