Главная
Study mode:
on
1
Introduction
2
Demo
3
What is Clickjacking
4
What we want
5
What developers can use
6
Older Android versions
7
Translucent Attack
8
How many apps have implementation flaw
9
Finding the Bypass
10
First Bypass
11
Second Bypass
12
Third Bypass
13
Wrist Attack
14
Mitigation
15
Conditions
16
Carbon Gadgets
17
Attack Table
18
Suggestions
19
Demonstration
Description:
Explore the security vulnerabilities of fingerprint authorization in Android apps through this 34-minute Black Hat conference talk. Delve into the concept of "Fingerprint-Jacking" and learn about practical hijacking techniques. Understand the basics of clickjacking and its application to fingerprint scanners. Discover implementation flaws in many Android apps and examine various bypass methods, including the Translucent Attack and Wrist Attack. Analyze the conditions for successful attacks and explore potential mitigation strategies. Gain insights into the security-critical nature of fingerprint scanners in mobile devices and the importance of thorough security analysis. Watch demonstrations of the discussed techniques and learn about suggested countermeasures to protect against fingerprint authorization hijacking.

Fingerprint-Jacking - Practical Fingerprint Authorization Hijacking in Android Apps

Black Hat
Add to list