Exploiting Android Messengers with WebRTC

Exploiting Android Messengers with WebRTC

nullcon via YouTube Direct link

Intro

1 of 20

1 of 20

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploiting Android Messengers with WebRTC

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is WebRTC?
  3. 3 WebRTC Terminology
  4. 4 WebRTC Architecture
  5. 5 WebRTC Vulnerabilities
  6. 6 Questions
  7. 7 RTP Bugs
  8. 8 CVE-2020-6514
  9. 9 Is a heap pointer sufficient to break ASLR on Android?
  10. 10 Revealing Memory with Bug 376
  11. 11 Setting IP (again)
  12. 12 Complete Exploit Steps
  13. 13 Investigating Android Applications
  14. 14 Implementing the Exploit in Frida
  15. 15 Methods to hook
  16. 16 Hooking Methods
  17. 17 Testing the exploit
  18. 18 Exploit results
  19. 19 Reducing the impact of WebRTC bugs
  20. 20 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.