The Three Billion Dollar App
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the intricacies of messaging app security in this 55-minute conference talk from TROOPERS14. Delve into the methodology of reverse engineering, data extraction, and code analysis of popular messaging applications. Learn about user enumeration, binary reversing techniques, encryption modes, and the process of creating and delivering exploits. Gain insights into high-profile security breaches and understand the potential vulnerabilities in billion-dollar messaging platforms. Discover the importance of thorough security analysis in modern communication apps and the impact of potential exploits on user privacy and data protection.
Syllabus
Intro
Why messaging apps?
Building the good parts
Methodology
Obtaining the data
Extract the code
Part 4 Reversing
Replay
Further comms
Generating the message
The 4.6 million leak
Delivering the exploit
Part 3 Extract code
User Enumeration
Re-cap.
Reversing the binary..
Encryption Mode
Free Registers
Create space..
Save the key
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube