Explore mobile device vulnerabilities and potential attacks in this 15-minute Security BSides London conference talk. Discover how devices like Raspberry Pi and USB-OTG accessories can be used to compromise rooted Android devices, including methods for inserting malicious files. Examine the consequences of rooted devices and investigate the possibility of programmatically rooting a device using a Raspberry Pi, documenting challenges encountered during the process. Consider the security implications of new charging port designs, particularly USB ports that could potentially conceal malicious hardware. Additionally, gain insights into past vulnerabilities associated with other mobile operating systems, such as iOS.
Overview
Syllabus
A Newbie's Talk On Mobile Dangers Through The Looking Glass - Sarah Kingham
Taught by
Security BSides London