Instructors: Iddo Eldor and Jacob Bech
Dates: June 24 to 27 2024
Capacity: 25
Few publicly-known hacks have inspired the imagination of security researchers as much as
exploits against IM (instant messaging) applications. 0-click attacks aimed against applications
such as WhatsApp, iMessage, and Telegram have raised unprecedented interest and have
often caused political turmoil. Yet, in sharp contrast with the curiosity that IM exploitation
generates, public information about this surface remains scant. This training is our bid to bridge
the gap.
This course will provide students with the knowledge and hands-on experience in reverse
engineering, vulnerability research, and exploitation of real-world IM applications. The target
audience is advanced security professionals.
Iddo Eldor is a vulnerability researcher and reverse engineer with over a decade of experience
working for top offensive cyber companies focusing on mobile.
Iddo regularly provides training courses on Mobile Vulnerability Research, Exploitation and
Fuzzing to a variety of private clients as well as free courses for youth in the periphery.
He solves most of his problems using Frida and waste most of his time coming up with creative
names for discovered vulnerabilities.
Jacob Bech is a vulnerability researcher specializing in static analysis and theoretical methods
like symbolic execution and program analysis. With years of dedication in the field, Jacob has
served as a key asset in various research organizations, currently working with an international
research group. An enthusiast of fuzzing techniques and a competitive spirit in Capture The
Flag competitions.
In addition to professional responsibilities, Jacob is passionate about education and has taught
multiple university-level courses covering the intricate facets of cybersecurity and ethical
hacking.
Click here to register.