Completed
Persistence (IV): injecting into
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Zen - A Complex Campaign of Harmful Android Apps
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Repackaging an app and using custom ads
- 3 What is a click fraud malware?
- 4 Click fraud for everything
- 5 Step 1: download and execute exploits
- 6 Step 2: enable accessibility services you
- 7 Account creation
- 8 Phone numbers are supplied by the C&C
- 9 Code injection
- 10 to get the CAPTCHA image...
- 11 and solve it...
- 12 and hook internal methods...
- 13 and hook a bit more
- 14 Obfuscation: DES
- 15 Persistence (1): writing to install-recovery.sh
- 16 Persistence (II): installing apps in /system
- 17 Persistence (1ll): framework modification
- 18 Persistence (IV): injecting into
- 19 Persistence summary
- 20 Timeline of the author's creations