Главная
Study mode:
on
1
Introduction
2
Android Terminology
3
Hey Google Take a Selfie
4
Intents
5
Permissions
6
Summary
7
Analyzing exported activities
8
Not looking for permission checks
9
Creating a rogue application
10
Persistence
11
Application
12
Hacking the Phone
13
The Screen
14
Back to the List
15
Location Metadata
16
Rogue Application
17
Proximity Sensor Activation
18
What Hackers Really Want
19
Disclosure Timeline
20
Other Android Vendors
21
Google Response
22
Conclusion
Description:
Explore a critical security research presentation revealing 0-day vulnerabilities in Android smartphones. Delve into the manipulation of actions and intents that allow unauthorized camera control without specific permissions. Learn about Android terminology, exported activities, permission checks, and the creation of rogue applications. Examine the implications for user privacy, including unauthorized selfies, screen capture, and location metadata extraction. Follow the disclosure timeline, Google's response, and the impact on other Android vendors. Gain insights into the intersection of voice assistant features and potential security risks in this eye-opening 28-minute Black Hat conference talk by Erez Yalon.

Hey Google, Activate Spyware! - When Google Assistant Uses a Vulnerability as a Feature

Black Hat
Add to list
0:00 / 0:00