Attacking Debug Modules in the Android Ecosystem
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the security vulnerabilities in Android debug modules through this 32-minute Black Hat conference talk. Dive into the native debug architecture of Android and examine vendor-specific debug modules, focusing on their role in capturing logs, managing exceptions, and supporting factory testing. Build a comprehensive threat model for debug modules and analyze potential attack surfaces. Discover how attackers can exploit these modules to obtain sensitive information and bypass permission controls. Learn about dozens of security issues found across three vendors, resulting in 49 CVE credits. Gain insights into interesting case studies and receive practical security recommendations to mitigate risks in the Android ecosystem.
Syllabus
Attacking Debug Modules In The Android Ecosystem
Taught by
Black Hat
Related Courses
Ethical Hacking for Mobile Phones, Facebook & Social Media!Udemy Android Security: Effective Permission Handling
Pluralsight Learning Mobile Device Security
LinkedIn Learning Securing Android Apps
LinkedIn Learning Ethical Hacking | Metasploit Tutorial | من الصفر للاحتراف
Udemy