Главная
Study mode:
on
1
Introduction
2
Disclaimers
3
Brief Introduction
4
Null Khan
5
Two questions
6
Why I wrote this paper
7
Authentication
8
Phone is your Identity
9
Playground
10
App ID
11
What can we do
12
Install by Script
13
Install by Rogue
14
Facebook
15
App Store
16
Play Store
17
Is it useful
18
Other vectors
19
The problem
20
The challenge
21
App foking
22
Googles headache
23
Password compromise
24
Captain Cool
25
Google Play
Description:
Explore a groundbreaking attack methodology called APPLANTING in this Black Hat EU 2013 conference talk. Delve into the world of mobile security vulnerabilities as Ajit Hatti demonstrates how attackers can install malicious apps on Android devices without user knowledge. Learn about the combination of CSRF and clickjacking techniques used to become a "man in the mobile" and carry out further damage. Examine the complexities of mobile platform security, the trade-offs between convenience and safety, and the challenges faced by app stores in preventing such attacks. Gain insights into authentication issues, the concept of phones as personal identities, and potential vectors for exploitation. Understand the implications of this attack on user privacy, data security, and the broader cybersecurity landscape.

Let's Play - Applanting

Black Hat
Add to list