The Three Billion Dollar App
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the intricacies of messaging app security in this 55-minute conference talk from TROOPERS14. Delve into the methodology of reverse engineering, data extraction, and code analysis of popular messaging applications. Learn about user enumeration, binary reversing techniques, encryption modes, and the process of creating and delivering exploits. Gain insights into high-profile security breaches and understand the potential vulnerabilities in billion-dollar messaging platforms. Discover the importance of thorough security analysis in modern communication apps and the impact of potential exploits on user privacy and data protection.
Syllabus
Intro
Why messaging apps?
Building the good parts
Methodology
Obtaining the data
Extract the code
Part 4 Reversing
Replay
Further comms
Generating the message
The 4.6 million leak
Delivering the exploit
Part 3 Extract code
User Enumeration
Re-cap.
Reversing the binary..
Encryption Mode
Free Registers
Create space..
Save the key
Taught by
WEareTROOPERS
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network