YoVDO

Attacking Debug Modules in the Android Ecosystem

Offered By: Black Hat via YouTube

Tags

Android Security Courses Mobile Security Courses Threat Modeling Courses Privilege Escalation Courses Security Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security vulnerabilities in Android debug modules through this 32-minute Black Hat conference talk. Dive into the native debug architecture of Android and examine vendor-specific debug modules, focusing on their role in capturing logs, managing exceptions, and supporting factory testing. Build a comprehensive threat model for debug modules and analyze potential attack surfaces. Discover how attackers can exploit these modules to obtain sensitive information and bypass permission controls. Learn about dozens of security issues found across three vendors, resulting in 49 CVE credits. Gain insights into interesting case studies and receive practical security recommendations to mitigate risks in the Android ecosystem.

Syllabus

Attacking Debug Modules In The Android Ecosystem


Taught by

Black Hat

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy