Exploiting Android Messengers with WebRTC

Exploiting Android Messengers with WebRTC

nullcon via YouTube Direct link

Investigating Android Applications

13 of 20

13 of 20

Investigating Android Applications

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploiting Android Messengers with WebRTC

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is WebRTC?
  3. 3 WebRTC Terminology
  4. 4 WebRTC Architecture
  5. 5 WebRTC Vulnerabilities
  6. 6 Questions
  7. 7 RTP Bugs
  8. 8 CVE-2020-6514
  9. 9 Is a heap pointer sufficient to break ASLR on Android?
  10. 10 Revealing Memory with Bug 376
  11. 11 Setting IP (again)
  12. 12 Complete Exploit Steps
  13. 13 Investigating Android Applications
  14. 14 Implementing the Exploit in Frida
  15. 15 Methods to hook
  16. 16 Hooking Methods
  17. 17 Testing the exploit
  18. 18 Exploit results
  19. 19 Reducing the impact of WebRTC bugs
  20. 20 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.