Luis De la Rosa
Security Consultant at Bishop Fox
Monterrey, Mexico
Actions
Luis De la Rosa is a Security Consultant at Bishop Fox, specializing in offensive mobile security across Android and iOS platforms. His work focuses on identifying and exploiting weaknesses in client-side logic, including bypassing jailbreak and root detection, SSL pinning, and application hardening mechanisms.
He has extensive experience in reverse engineering and dynamic instrumentation, leveraging tools such as Frida to manipulate application behavior at runtime. Luis also develops custom tooling to automate mobile pentesting workflows and uncover complex vulnerabilities at scale.
Luis is an active member of the offensive security community and a competitive CTF player, with multiple wins and top placements in events such as HackMex and Ekoparty Red Team Village.
He has presented his research at international conferences including DEF CON (La Villa Hacker Village), Ekoparty (Argentina), Mind The Sec (Brazil), BSides Panama, HackGDL, and Pwnterrey. His talks focus on practical, real-world attack scenarios, combining live demonstrations with actionable insights to help organizations better understand and mitigate client-side risks.
Area of Expertise
Topics
Mobile Pentest Survival Guide
Descubre cómo hackear apps de Android. Desde analisis estatico, hasta evadir protecciones avanzadas como Root Detection, SafetyNet y Play Integrity. Cierra una PoC de vulnerabilidades comunes en estas pruebas. ¡Todo lo que necesitas para dominar el pentesting móvil!
Mobile Pentest Survival Guide Reloaded
Descubre cómo hackear apps de Android. Desde analisis estatico, hasta evadir protecciones avanzadas como Root Detection, SafetyNet y Play Integrity. Cierra una PoC de vulnerabilidades comunes en estas pruebas. ¡Todo lo que necesitas para dominar el pentesting móvil!
Burning Down the Walls: Evasión de Métodos de Seguridad en Android e iOS
En este workshop explicaremos como se puede identificar y bypassear métodos de seguridad como root detection y jailbreak detection en android e ios respectivamente. Además veremos el como se puede realizar de manera automatizada con tools como objection o manual desde como es que se puede crear un script para realizar estos bypasses entendiendo las diferentes tecnologías
Pwnterrey Sessionize Event
HackGDL 2025 Sessionize Event
Ekoparty Security Conference 2024 Sessionize Event
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top