Is a heap pointer sufficient to break ASLR on Android?
10
Revealing Memory with Bug 376
11
Setting IP (again)
12
Complete Exploit Steps
13
Investigating Android Applications
14
Implementing the Exploit in Frida
15
Methods to hook
16
Hooking Methods
17
Testing the exploit
18
Exploit results
19
Reducing the impact of WebRTC bugs
20
Conclusions
Description:
Explore the security implications of WebRTC vulnerabilities in Android messaging applications through this informative conference talk from Nullcon Webinar 2021. Dive into the process of identifying and exploiting WebRTC vulnerabilities across various mobile apps. Learn about the WebRTC architecture, terminology, and common security issues. Discover techniques for revealing memory, breaking ASLR on Android, and implementing exploits using Frida. Gain insights into methods for reducing the impact of WebRTC bugs and enhancing the security of mobile platforms. Benefit from the expertise of Natalie Silvanovich, a Google Project Zero security researcher, as she shares her findings and recommendations for improving mobile application security.