Attacking the Samsung Galaxy A Boot Chain
Offered By: OffensiveCon via YouTube
Course Description
Overview
Dive into a comprehensive 44-minute conference talk from OffensiveCon24 that explores the intricacies of attacking the Samsung Galaxy A* boot chain. Join security researchers Maxime Rossi Bellom, Damiano Melotti, Raphael Neveu, and Gabrielle Viala as they present their findings and methodologies. Gain insights into the vulnerabilities and potential exploit vectors within the boot process of Samsung Galaxy A series devices. Learn about the team's approach to reverse engineering, vulnerability discovery, and exploit development in the context of mobile device security. Understand the implications of these findings for both security professionals and device manufacturers. This talk provides valuable knowledge for those interested in mobile security, reverse engineering, and the ongoing challenges in securing modern smartphones.
Syllabus
OffensiveCon24 - Maxime Rossi Bellom, Damiano Melotti, Raphael Neveu, Gabrielle Viala
Taught by
OffensiveCon
Related Courses
Ethical Hacking in 15 Hours - 2023 Edition - Learn to HackCyber Mentor via YouTube Contextomy - Let's Debug Together
nullcon via YouTube macOS Security Features Bypasses by Example
nullcon via YouTube Exploiting Android Messengers with WebRTC
nullcon via YouTube XNU Heap Exploitation - From Kernel Bug to Kernel Control
nullcon via YouTube