Advanced Android Hacking course
Road To Pwn2own
In this course, Ken Gannon, a multi-year Pwn2Own winner and a Pwnie award winner, shows how competitors approach the challenge of Pwn2Own.
You'll see the mindset, techniques, and strategies behind turning small flaws into full mobile device compromises.
You will then practice those exact steps on interactive mobile devices and specially created labs that recreates the longest Pwn2Own bug chain.
You will then practice those exact steps on interactive mobile devices and specially created labs that recreates the longest Pwn2Own bug chain.
Don't miss out! Pre-sale 'APPSECADV50' for 50% off. Offer ends soon!
Key Takeaways
Whats Included
Pwn2Own Success Stories
Created by
Ken Gannon
Head of Vulnerability Research - Mobile Hacking Lab
Guaranteed Security using one of the most advanced encrypted systems on the market.
The information in this page is being processed and encrypted securely using industry-leading encryption and fraud prevention tools.