Главная
Study mode:
on
1
Introduction
2
Mobile Malware
3
Mobile Remote Access
4
Examples
5
Types
6
Benchmarks
7
Largescale experiment
8
Results
9
Agenda
10
What is MDM
11
What MDM solutions provide
12
Secure Container
13
Assumptions
14
Demo
15
Steps
16
Root Vulnerability
17
Securing Container
18
iOS
19
Install Secure Container
20
Hook Secure Container
21
Conclusion
22
Summary
23
Key Issues
24
Layer Approach
25
Recap
26
Questions
Description:
Explore a novel proof-of-concept attack technique that bypasses traditional mobile malware detection measures and circumvents common Mobile Device Management (MDM) features in this Black Hat USA 2013 conference talk. Delve into the world of spyphones, surveillance tools surreptitiously planted on users' handheld devices, and learn how these mobile cyber-espionage attacks are carried out. Discover the differences between typical malicious mobile applications and spyphones used by nation-states. Gain insights into how this attack method can overcome encryption and other MDM security measures. Follow along as the speakers demonstrate the attack steps, including root vulnerability exploitation, secure container installation, and container hooking. Understand the key issues surrounding mobile device security and the proposed layer approach to address these vulnerabilities. Conclude with a recap of the presented information and participate in a Q&A session to further explore this critical topic in mobile security. Read more

A Practical Attack Against MDM Solutions

Black Hat
Add to list
0:00 / 0:00