All Your SMS & Contacts Belong to ADUPS & Others
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a Black Hat conference talk that uncovers alarming privacy breaches in Android devices. Delve into research revealing how certain Android models contain firmware that covertly collects and transmits users' sensitive personal data to servers in China without consent or disclosure. Learn about the ADUPS firmware, its track record, and the various types of data exfiltrated, including text messages, browsing history, and application logs. Understand the internal mechanisms used for data collection and transmission, and gain insights into the broader implications of these privacy violations in the mobile device ecosystem.
Syllabus
Introduction
The issue became public
Internal threats
ADUPS
ADUPS Website
ADUPS Track Record
Blue Device
PII Exfiltration
Internals
Text Message Exfiltration
Text Message Encryption
JSON Files
Browsing History
Application Code
Logger
Android Log
Bluetooth Snoop Log
Modem Log Generator
Summary
Questions
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube