Name
Hacking Droids
Description

In this workshop we will go over the Android OS, file structure, inherent vulnerabilities, associated exploits and data exfiltration. We will also learn persistence as well as using a user's device to track their physical location and surroundings. We will also go over a proof-of-concept attack that drove me down the road to studying mobile exploitation and how dangerous the effects of these attacks can be to personal safety.

We'll cover:

  • Identifying vulnerable devices
  • Malicious APK's
  • Encoding payloads to evade AV
  • What to do after gaining control
  • How the exploit can be used to track individuals
  • Proof-of-concept: How to spread ransomware via mobile devices.
Date & Time
Thursday, May 26, 2022, 1:00 PM - 2:30 PM