YoVDO

All Your Root Checks Belong to Us - The Sad State of Root Detection

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Data Security Courses Mobile Security Courses

Course Description

Overview

Explore the vulnerabilities in root detection mechanisms for Android devices in this Black Hat conference talk. Delve into the world of mobile security, focusing on the challenges posed by rooted devices in the context of Bring Your Own Device (BYOD) policies and Mobile Device Management (MDM) solutions. Analyze popular Android security applications and BYOD solutions to understand their root detection methods. Learn about reverse engineering techniques used to circumvent these checks, and discover AndroPoser, a tool designed to bypass root detection. Gain insights into the implications of easily subverted root checks for both personal and corporate data security on mobile devices. Examine the broader impact on mobile device security practices and the need for more robust detection methods in an increasingly BYOD-oriented workplace.

Syllabus

Intro
Agenda
Context
Root Devices
Java
Tools
Results
General Device Settings
Root Checks
Root Check Results
Root Clock
AirWatch
Library hooking
Conclusion
What we learned
Questions


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube