YoVDO

BlackBerryOS 10 from a Security Perspective

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Mobile Development Courses Mobile Security Courses Privilege Escalation Courses Rootkits Courses Memory Corruption Courses

Course Description

Overview

Explore the security landscape of BlackBerryOS 10 in this 52-minute Black Hat USA 2013 conference talk by Ralf-Philipp Weinmann. Delve into the platform's architectural overhaul, including the adoption of QNX as the base operating system and the introduction of native code applications. Analyze the attack surface, examining methods for local privilege escalation and remote entry points. Investigate rootkit persistence techniques and evaluate the effectiveness of BlackBerry Balance in securely separating business data from personal applications. Gain insights into exploit mitigation, memory corruption, remote vectors, cryptographic protection, and the intricacies of BlackBerry's security features.

Syllabus

Intro
History of BlackBerry
UNIX
Objective
Previous work
Micro Kernel
Userspace demons
Finegrained permissions
Methodology
Exploit Mitigation
Memory Corruption
Other Similarities
Remote vectors
IP stack
Chipsets
Engineering Screens
Remote Lock Collection
Lip Forensics
Cryptographic protection
Token protection
Persistence
Blackberry Balance
Group IDs
Equip
Colonel
Encryption
QCon
Applications


Taught by

Black Hat

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy