Hacking the Jolla - An Intro to Assessing A Mobile Device
Offered By: YouTube
Course Description
Overview
Explore the intricacies of hacking the Jolla mobile device in this comprehensive conference talk from Circle City Con 2015. Delve into the history of Nokia and learn about smart back covers before examining the attack surface and device topology. Investigate partitions, boot images, and image signing processes. Discover recovery fastboot methods and troubleshoot security codes. Analyze the boot process, HMAC, and various locks. Explore the operating system, application layer, and local attack surface. Examine SIM Kit and SD card vulnerabilities through path fuzzing and init script manipulation. Investigate kernel security, dbus sniffing, and user interaction. Learn about importing contacts, third-party apps, and platform proxies. Gain insights into hardware components like NFC tags and the developer kit. Master the art of assessing mobile device security through practical examples and lessons learned.
Syllabus
Introduction
History of Nokia
Smart Back Cover
Attack Surface
Device Topology
Partitions
Boot Image
Binwalk
MakeBoot
Boot Image Structure
Image Signing
Recovery Fastboot
Recovery Menu
Troubleshooting
Security Code
Bbbc
Device UI
Boot Process
HMAC
RestoreLock
StoreLock
Ruby
Operating System
Device
Application Layer
Userland
Local Attack Surface
SIM Kit
SD Card Path
grep
path
fuzz
init script
fun example
another fun example
shellshocked
lessons learned
kernel panic
kernel security
dbus
dbus sniffer
dbus map
dbus code
dbus sent
user interaction
import contacts
thirdparty apps
platform
proxy
tips
Apps
Invoke
Hardware
NFC Tag
Developer Kit
Thanks
Related Courses
Introduction to Enterprise ComputingMarist College via Independent Advanced Operating Systems
Georgia Institute of Technology via Udacity Programmation sur iPhone et iPad (partie I)
Université Pierre et Marie CURIE via France Université Numerique 操作系统原理(Operating Systems)
Peking University via Coursera Introduction to Operating Systems
Georgia Institute of Technology via Udacity