Description: Slide : - http://www.sourceconference.com/publications/bos12pubs/android-modding-source.pdf
After getting involved in the Android rooting scene, I observed that there is a disconnect between the community interested in "modding" (modifying) their devices and those looking at Android from a security practitioner's perspective. In this talk, I will provide technical details on many key concepts in the modding world, including rooting, locked/unlocked bootloaders, S-ON/S-OFF, fastboot, ROM flashing, and various other techniques. We'll look at real examples of vulnerabilities and exploits used to root and unlock Android phones, and I'll share several techniques that I contributed to the modding community. There will be an emphasis on what we as security practitioners can learn from the modding community, what they can learn from us, and how Android modding affects both the hobbyist user and enterprise Android deployment.
Dan is a security consultant and vulnerability researcher at VSR, where he performs application and network penetration testing, conducts code reviews, and identifies vulnerabilities in third-party software. His current research interests include exploit development, kernel hardening, and mobile security.
Tags: securitytube , hacking , hackers , information security , convention , computer security , SOURCE-boston-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.