Skip to main content
  • Blurred lights in different colours at night
1 of 3

Mobile Exploitation Training

Mon Jul 15, 2024 9:00 AM - Thu Jul 18, 2024 5:00 PM EDT 20003

Mobile Exploitation Training

Mon Jul 15, 2024 9:00 AM - Thu Jul 18, 2024 5:00 PM EDT 20003

This 4 day course is designed to provide students with both an overview of the Android attack surface and an in-depth understanding of advanced vulnerability and exploitation topics. Attendees will be immersed in hands-on exercises that impart valuable skills including static and dynamic reverse engineering, zero-day vulnerability discovery, binary instrumentation, and advanced exploitation of widely deployed mobile platforms.

Taught by Senior members of the Exodus Intelligence Mobile Research Team, this course provides students with direct access to our renowned professionals in a setting conducive to individual interactions.


Emphasis

Hands on with privilege escalation techniques within the Android Kernel, mitigations and execution migration issues with a focus on MediaTek chipsets.


Prerequisites

  • Computer with the ability to run a VirtualBox image (x64, recommended 1GB+ memory)
  • Some familiarity with: IDA Pro, Python, C/C++.
  • ARM ASM fluency strongly recommended.
  • Installed and usable copy of IDA Pro 6.1+, VirtualBox, Python 2.7+.

Syllabus

Android Kernel

  • Process Management
  • Important structures
  • Memory Management
  • Virtual memory
  • Memory allocators
  • Build the kernel
  • Boot and Root the kernel
  • Kernel debugging
  • demo
  • Samsung Knox/RKP
  • Type of kernel vulnerabilities
  • Exploitation primitives
  • kernel vulnerabilities overview
  • heap overflows, UAF
  • Info leakage
  • Mali GPU
  • Vulnerability overview
  • Exploitation
  • Vulnerability overview
  • Exploitation
  • type confusion to write access to globally shared memory
  • UAF which can lead to arbitrary read and write of kernel memory
  • Vulnerability overview
  • Exploitation - convert the double free into a use-after-free of a struct page

Mediatek / Exynos baseband

  • Introduction
  • exynos baseband overview
  • mediatek baseband overview
  • Previous researches
  • Analyze modem
  • Emulation / Fuzzing
  • Rogue base station
  • secure boot
  • mediatek boot rom vulnerability
  • Vulnerability overview
  • Exploitation
  • use brom exploit to patch the tee
  • write the modem physical memory from EL1

Location

20003