Bypassing the Android Permission Model
Offered By: Hack in Paris via YouTube
Course Description
Overview
Explore techniques for bypassing Android's permission model in this 48-minute conference talk from Hack in Paris. Discover how attackers can gain additional permissions without exploiting root privileges, including methods that take advantage of insecure storage practices and poorly implemented interfaces in other installed apps. Examine real-world examples from the Android Market, view demonstrations, and analyze code snippets illustrating these vulnerabilities. Learn about Android's built-in security resources and gain insights on how developers and users can mitigate these risks to enhance mobile device security.
Syllabus
Georgia Weidman Bypassing the Android Permission Model
Taught by
Hack in Paris
Related Courses
NetflOSINT- Taking an Often-Overlooked Data Source and Operationalizing It - Joe Gray - Hack in ParisHack in Paris via YouTube All Roads Lead to OpenVPN Pwning Industrial Remote Access Clients - Sharon Brizinov - Hack in Paris - 2021
Hack in Paris via YouTube Exploits in Wetware - R. Sell - Hack in Paris - 2019
Hack in Paris via YouTube All Your GPS Trackers Belong to Us - C. Kasmi, P. Barre - Hack in Paris - 2019
Hack in Paris via YouTube In NTDLL I Trust - Process Reimaging and Endpoint Security Solution Bypass - E. Carroll - Hack in Paris - 2019
Hack in Paris via YouTube