Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

SigMorph - Covert Communication Exploiting Android Signing Schemes

nullcon via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of Android binary manipulation and covert communication techniques in this conference talk from nullcon. Delve into the intricacies of Android Signature Schemes (v1, v2, v3) and learn how to exploit their shortcomings to modify APK binaries without breaking signatures. Discover potential use cases, both malicious and non-malicious, including methods for embedding undetectable malicious data in legitimate Play Store applications while preserving signing signatures. Examine how this technique can be applied to create malware variations with lower detection rates, using the Pegasus malware as an example. Gain insights into advanced Android hacking and information security concepts that push the boundaries of mobile application manipulation and covert communication.

Syllabus

SigMorph: Covert Communication Exploiting Android Signing Schemes - Ayan Saha And Achute Sharma

Taught by

nullcon

Reviews

Start your review of SigMorph - Covert Communication Exploiting Android Signing Schemes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.