Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Android - One Root to Own Them All

Black Hat via YouTube

Overview

Explore the technical intricacies of Android security bug 8219321 in this Black Hat USA 2013 conference talk. Delve into the vulnerability that allows APK code modification without breaking cryptographic signatures, potentially leading to system access and control. Learn how the bug was discovered, how an exploit was created, and why it works across various Android devices. Gain insights into the Android security model, platform signing, and exploitation techniques. Examine the impact on city infrastructure, the ease of exploitation, and other related security issues. Understand the timeline of disclosure, end-user risks, and the role of security scanners. Discover why this vulnerability affects so many devices and the implications for Android security.

Syllabus

Introduction
What is Android
How did we find this bug
How do we get signatures
Zip file format
Java verifier
Postmortem
Android Security Model
System
Platform sign
How to exploit
Exploit payload
Merge apks
Exploit lock loaded
More fun stuff
System level access
City Impactor
Easy to exploit
Other bugs
RSA verification
Bluebox disclosure
Java vs C
Signed vs unsigned
Android Security Blog
Timeline
End user risk
Security scanner
Why are so many
Bluebox
Thank you

Taught by

Black Hat

Reviews

Start your review of Android - One Root to Own Them All

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.