Completed
Recovery Mode Menu
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Physical Attacks Against Smartphones: Android Security Vulnerabilities and Exploits
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Case Study 1 - Rooting On A Locked Bootloader
- 3 Target Device
- 4 Disabled Bootloader Unlock
- 5 Finding An Exploit
- 6 SELinux Protection
- 7 Alternative Attack Vectors
- 8 Custom Recovery Mode
- 9 Finding An Update Image
- 10 Recovery Mode Menu
- 11 Root Cause Analysis
- 12 Exploiting Command Injection
- 13 Getting A Shell
- 14 Switching To Android
- 15 Overriding Init
- 16 Init Process
- 17 Shared Mounts
- 18 Patching out SELinux Checks
- 19 Fixing Kernel Panics
- 20 Reinitialising Services
- 21 Replacing Read-Only Files
- 22 Hidden RAMDisk
- 23 Case Study 2 - Exploiting An Exynos Secondary Bootloader
- 24 Fuzzing USB Control Transfers
- 25 Initial Fuzzing Attempts
- 26 Causing A Crash
- 27 Exploiting Descriptor Overwrite
- 28 Brute Forcing Memory
- 29 Dumping Memory
- 30 DEP Misconfiguration
- 31 Basic Code Execution
- 32 Reimplementing Boot
- 33 Boot Debugging
- 34 Kernel Execution
- 35 Boot Failure
- 36 Bootloader Threads
- 37 Disabling Threads
- 38 Aarch64 Exceptions
- 39 Additional Errors
- 40 Android Modification
- 41 Final Notes
- 42 Disclosure
- 43 Conclusion