Star 0

Abstract

It is becoming increasingly popular for tablets and smartphones to be allowed access to corporate resources, however, many enterprises do not block 'rooted' and 'jailbroken' devices. In this session, we will examine several of the penetration testing tools available for ARM platforms and demonstrate the risk posed by 'jailbroken' and 'rooted' mobile devices connecting to the corporate network.