Главная
Study mode:
on
1
Introduction
2
Overview
3
Benefits for developers
4
How it works
5
Example
6
ProjectState
7
Verification
8
Secure Implementation
9
Google Documentation
10
Known Vulnerability
11
Modify Intent
12
Verify Process
13
ClientSide Fix
14
Steps
15
Do the Jump
16
Demo
17
Snoopy Pop
18
Proof
19
Java Native Interface
20
Shell Library
21
Conclusion
22
Google Billing Library
Description:
Explore a conference talk that delves into the vulnerabilities of Google Play Billing API and demonstrates how attackers can bypass payment processes in popular Android games. Learn about the billing workflow, known vulnerabilities, and real-world examples of compromised applications. Discover techniques used by developers to protect billing processes and how reverse engineering can still circumvent these measures. Gain insights into the number of vulnerable applications and compare Google's billing system with alternatives from Amazon and Samsung. Understand the implications for developers and users, and explore potential solutions to enhance security in mobile app transactions.

Abusing Google Play Billing for Fun and Unlimited Credits! - G. Lopes - Hack in Paris

Hack in Paris
Add to list
0:00 / 0:00