YoVDO

Defeating Samsung KNOX with Zero Privilege

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Mobile Device Security Courses Privilege Escalation Courses

Course Description

Overview

Explore an exploit chain that defeats Samsung KNOX security with zero privilege, as presented at Black Hat. Dive into the technical details of vulnerabilities and mitigation bypassing techniques, including KASLR bypassing, DFI bypassing, full SELinux bypassing, and privilege escalation. Learn how this exploit can be executed by any untrusted application, posing significant security implications for Samsung devices. Gain insights from security researcher Di Shen's 39-minute talk, which provides a comprehensive breakdown of the attack methodology and its potential impact on mobile device security.

Syllabus

Defeating Samsung KNOX with Zero Privilege


Taught by

Black Hat

Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Security Awareness Training
(ISC)² via Coursera
Masterclass - Hacking de dispositivos moviles
Udemy
Threat and Vulnerability Management for CompTIA CySA+
Pluralsight
Protecting Devices and Applications in Microsoft 365
Pluralsight