The document discusses mobile application security testing. It introduces the presenter and covers browser-based and installable mobile apps. It then describes various methods for intercepting mobile application traffic such as using proxies and importing certificates. The conclusion emphasizes that mobile apps require secure development practices due to accessing sensitive data and extending network boundaries.
Related topics: