YoVDO

BlackBerryOS 10 from a Security Perspective

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Mobile Development Courses Mobile Security Courses Privilege Escalation Courses Rootkits Courses Memory Corruption Courses

Course Description

Overview

Explore the security landscape of BlackBerryOS 10 in this 52-minute Black Hat USA 2013 conference talk by Ralf-Philipp Weinmann. Delve into the platform's architectural overhaul, including the adoption of QNX as the base operating system and the introduction of native code applications. Analyze the attack surface, examining methods for local privilege escalation and remote entry points. Investigate rootkit persistence techniques and evaluate the effectiveness of BlackBerry Balance in securely separating business data from personal applications. Gain insights into exploit mitigation, memory corruption, remote vectors, cryptographic protection, and the intricacies of BlackBerry's security features.

Syllabus

Intro
History of BlackBerry
UNIX
Objective
Previous work
Micro Kernel
Userspace demons
Finegrained permissions
Methodology
Exploit Mitigation
Memory Corruption
Other Similarities
Remote vectors
IP stack
Chipsets
Engineering Screens
Remote Lock Collection
Lip Forensics
Cryptographic protection
Token protection
Persistence
Blackberry Balance
Group IDs
Equip
Colonel
Encryption
QCon
Applications


Taught by

Black Hat

Related Courses

Check Point Jump Start: Harmony Mobile
Checkpoint via Coursera
Check Point Jump Start: Harmony Mobile
Checkpoint via edX
Next-Gen Security: Mobile, IoT, and Cloud
University System of Maryland via edX
Advanced Cybersecurity
LearnKartS via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera