Главная
Study mode:
on
1
Intro
2
About CORE Team
3
What is Binder
4
Our work around Binder Driver
5
IPC through Binder driver
6
The imperfect protection of the "binder_buffer" object
7
The "all-round" vulnerability
8
Impact: The "Waterdrop"
9
Stable Dos to Memory corruption
10
The Baits
11
Info leaks
12
Heap spraying skills: guard heap spray
13
Heap spraying skills: bullet spray
14
Heap spraying skills: mirror spray
15
How to arbitrary write with arbitrary data
16
KSMA Attack
17
Conclusion
Description:
Explore a critical Android security vulnerability in this Hack In The Box Security Conference talk. Dive into the "Waterdrop" vulnerability (CVE-2019-2025) affecting the Binder driver, a key component of the Android system. Learn about its three striking features: universal root solution potential, sandbox escalation capabilities, and arbitrary read/write functionality. Discover how this vulnerability impacts most Android devices from the past two years, including Google Pixel models, Samsung, Huawei, and OPPO. Follow the speakers as they demonstrate successful rooting of the latest Pixel 3XL, 2XL, and Pixel devices. Gain insights into the Binder driver, IPC processes, and various heap spraying techniques used in exploiting this vulnerability. Understand the impact and implications of this security flaw on Android devices running kernel versions 3.18 to 4.20.

Binder - The Bridge To Root - Hongli Han and Mingjian Zhou

Hack In The Box Security Conference
Add to list
0:00 / 0:00