Security & Penetration Testing of Mobile Application and APIs
This is a white-hat hacking approach in which a firm is given special permission to try and break into, exploit, or otherwise attempt to break a given product via security vulnerabilities. First, we would like students to get familiar with our product. Sign up, play around with it, understand generally how it works. Second, students should spend time conducting research on state of the art pen testing technologies. They should look into common vulnerability lists such as OWASP Top 10, and common security tools such as Nmap, Burp Suitar, Nessus, and Wireshark. Third, students should have a written attack plan and present it to us so we can confirm we understand what the test will do and what might be uncovered. Fourth, students are free to attack our product as per the presented plan