Главная
Study mode:
on
1
Introduction
2
Who am I
3
Laser Tag
4
Clarification
5
Story
6
Client Questions
7
Do We Need Exchange
8
Its Too Simple
9
SSL
10
Expert opinion
11
Lets get started
12
Installing Exchange
13
Hacking Competition
14
Provision Command
15
Service Response
16
Binary XML
17
Developing Concept
18
Structure
19
Device Encryption
20
Man in the Middle
21
Targets
22
Dance
23
Request
24
Policy Push
25
Demo Time
26
Python Script
27
Email
28
Phone
29
iPhone
30
Future Work
31
Open Source Software
32
Active Sync
33
Google Backdoor
34
Conclusion
35
Thank you
Description:
Explore a Black Hat USA 2012 conference talk that delves into the vulnerabilities of Microsoft Exchange's mobile device management policies. Learn how attackers can exploit the protocol for updating these policies to remotely wipe connected devices without authentication. Discover the process of impersonating an Exchange server and sending policy updates through a simple script to erase data on Android and iOS devices. Gain insights into the security implications of Exchange's relationship with mobile clients, including password complexity enforcement, screen timeouts, and remote lockout features. Follow along as the speaker demonstrates proof-of-concept code and discusses potential future developments in this area of mobile security.

Exchanging Demands

Black Hat
Add to list
0:00 / 0:00