Главная
Study mode:
on
1
Intro
2
Why InApp Billing
3
Games
4
Supercell
5
Mobile MMOs
6
Cheating the system
7
What is app billing
8
How it works
9
Google Play API
10
InApp Billing
11
InApp Billing Demo
12
IAB Helper
13
Intent For Purchasing
14
Cracked binaries
15
The problem for developers
16
Questions
17
Cydia Substrate
18
Java Virtual Machine
19
Substrate
20
Exploit Example
21
Common Flaws
22
Excessive Logging
23
Signature Verification
24
ClientSide Signature Verification
25
Demo
26
How does it work
27
IAB helper class
28
Replace Intent
29
Verify Signature Methods
30
The Context
31
ClientSide Trust
32
Pandora Example
33
Exceptions
34
SISV token
35
Obfuscation
36
Public Key
37
Unmodified Code
38
Heartbleed
39
Stack Overflow
Description:
Explore Android in-app purchase exploitation techniques in this 44-minute conference talk from Derbycon 2015. Delve into the intricacies of in-app billing, its implementation, and vulnerabilities. Learn about the Google Play API, IAB Helper, and common flaws in mobile game monetization. Examine real-world examples, including Supercell games and mobile MMOs. Discover how cracked binaries and Cydia Substrate can be used to manipulate the Java Virtual Machine. Analyze client-side trust issues, signature verification methods, and potential exploits. Investigate the Pandora example, SISV token obfuscation, and public key vulnerabilities. Gain insights into protecting against these exploits and understanding the implications of excessive logging and client-side signature verification.

Unbillable - Exploiting Android In-App Purchases

Add to list
0:00 / 0:00