Defeating Samsung KNOX with Zero Privilege
Offered By: Black Hat via YouTube
Course Description
Overview
Explore an exploit chain that defeats Samsung KNOX security with zero privilege, as presented at Black Hat. Dive into the technical details of vulnerabilities and mitigation bypassing techniques, including KASLR bypassing, DFI bypassing, full SELinux bypassing, and privilege escalation. Learn how this exploit can be executed by any untrusted application, posing significant security implications for Samsung devices. Gain insights from security researcher Di Shen's 39-minute talk, which provides a comprehensive breakdown of the attack methodology and its potential impact on mobile device security.
Syllabus
Defeating Samsung KNOX with Zero Privilege
Taught by
Black Hat
Related Courses
CNIT 127: Exploit DevelopmentCNIT - City College of San Francisco via Independent Enterprise Security Fundamentals
Microsoft via edX Penetration Testing - Post Exploitation
New York University (NYU) via edX Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy Hands-on Penetration Testing Labs 4.0
Udemy