Главная
Study mode:
on
1
Introduction
2
History of Nokia
3
Smart Back Cover
4
Attack Surface
5
Device Topology
6
Partitions
7
Boot Image
8
Binwalk
9
MakeBoot
10
Boot Image Structure
11
Image Signing
12
Recovery Fastboot
13
Recovery Menu
14
Troubleshooting
15
Security Code
16
Bbbc
17
Device UI
18
Boot Process
19
HMAC
20
RestoreLock
21
StoreLock
22
Ruby
23
Operating System
24
Device
25
Application Layer
26
Userland
27
Local Attack Surface
28
SIM Kit
29
SD Card Path
30
grep
31
path
32
fuzz
33
init script
34
fun example
35
another fun example
36
shellshocked
37
lessons learned
38
kernel panic
39
kernel security
40
dbus
41
dbus sniffer
42
dbus map
43
dbus code
44
dbus sent
45
user interaction
46
import contacts
47
thirdparty apps
48
platform
49
proxy
50
tips
51
Apps
52
Invoke
53
Hardware
54
NFC Tag
55
Developer Kit
56
Thanks
Description:
Explore the intricacies of hacking the Jolla mobile device in this comprehensive conference talk from Circle City Con 2015. Delve into the history of Nokia and learn about smart back covers before examining the attack surface and device topology. Investigate partitions, boot images, and image signing processes. Discover recovery fastboot methods and troubleshoot security codes. Analyze the boot process, HMAC, and various locks. Explore the operating system, application layer, and local attack surface. Examine SIM Kit and SD card vulnerabilities through path fuzzing and init script manipulation. Investigate kernel security, dbus sniffing, and user interaction. Learn about importing contacts, third-party apps, and platform proxies. Gain insights into hardware components like NFC tags and the developer kit. Master the art of assessing mobile device security through practical examples and lessons learned.

Hacking the Jolla - An Intro to Assessing A Mobile Device

Add to list