All Your Root Checks Belong to Us - The Sad State of Root Detection
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities in root detection mechanisms for Android devices in this Black Hat conference talk. Delve into the world of mobile security, focusing on the challenges posed by rooted devices in the context of Bring Your Own Device (BYOD) policies and Mobile Device Management (MDM) solutions. Analyze popular Android security applications and BYOD solutions to understand their root detection methods. Learn about reverse engineering techniques used to circumvent these checks, and discover AndroPoser, a tool designed to bypass root detection. Gain insights into the implications of easily subverted root checks for both personal and corporate data security on mobile devices. Examine the broader impact on mobile device security practices and the need for more robust detection methods in an increasingly BYOD-oriented workplace.
Syllabus
Intro
Agenda
Context
Root Devices
Java
Tools
Results
General Device Settings
Root Checks
Root Check Results
Root Clock
AirWatch
Library hooking
Conclusion
What we learned
Questions
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube