Secrets in Soft Token - A Security Study of HID Global Soft Token
Offered By: Cooper via YouTube
Course Description
Overview
Explore a security study of the Android version of HID Global Soft Token application in this 36-minute conference talk from Hack.lu 2016. Delve into the mechanisms used to protect key functional processes like generating encryption and OTP keys. Uncover two vulnerabilities affecting the application, including cryptographic weaknesses that could allow attackers to retrieve resources, clone configurations, and potentially discover a victim's PIN through brute force attacks. Follow along as security researcher Mouad Abouhali from Airbus Group Innovations breaks down the study objectives, methodology, and solutions, covering topics such as string analysis, Java reflection, code reading, and encryption tasks.
Syllabus
Introduction
Study Objectives
Security Mechanism
Methodology
Strings
Java Reflection
Reading the code
Encryption task
Solution
Taught by
Cooper
Related Courses
Cryptography and Information TheoryUniversity of Colorado System via Coursera Web Application Security Testing with Burp Suite
Coursera Project Network via Coursera Learn Hacking and use your Android as a Hacking Machine
Udemy Advanced Cyber Security Training: Hands-On Password Attacks
EC-Council via FutureLearn Web Guard Dog WordPress Security
Udemy