Главная
Study mode:
on
1
Intro
2
PRESENT SITUATION
3
A BIG DEAL
4
FUZZING
5
CRASH WHEN CLOSE?
6
WHEN IT COMES TO UAF
7
WE ARE IN THE KERNEL
8
WHAT USED TO RE-FILL
9
INTUITIVE IDEA
10
SLUB HELPS US?
11
THE RETURN OF PHYSMAP
12
INITIAL PLAN
13
RELIABLE MEMORY COLLISION
14
UNLEASH KERNEL UAF
15
PC CONTROL
16
WHAT DOES SHELLCODE DO
17
WHAT ABOUT 64BIT DEVICES
18
OOPS! PXN APPLIED.
19
ROP TIPS
20
CONCLUSION
21
FUTURE
22
PWNIE
23
ACKNOWLEDGEMENT
Description:
Explore a groundbreaking presentation on universal Android rooting techniques delivered at Black Hat. Dive into the discovery of a critical kernel Use-After-Free bug affecting all Linux kernel versions, and learn how it was exploited to root most Android devices, including 64-bit models. Examine the root cause of the vulnerability, innovative exploitation methods, and techniques to bypass modern kernel mitigations like PXN. Gain insights into kernel memory manipulation, code execution in kernel mode, and the challenges of 64-bit Android platforms. Discover a common approach to exploiting Android kernel Use-After-Free bugs for rooting, and explore future kernel security issues in upcoming 64-bit Android systems.

Universal Android Rooting Is Back

Black Hat
Add to list
0:00 / 0:00