Binder Fuzz based on drozer & Some interesting Vulnerabilities sharing (@0xr0ot) 0xr0ot.sec@gmail.com Kcon Beijing 2016 Who am I • ID:0xr0ot(not 0xroot) • Security researcher(2 years) • Mainly focus on Android security • Always like basketball Agenda • drozer introduction • Binder fuzz model • Case share • How to exploit Drozer Architecture • console • agent • server Functionality • Exploit • Scanner Metasploit? Design Principles • Reflection • Class loading Drozer mode • direct mode • infrastructure mode Commands drozer server start --port port drozer exploit build exploit.usb.socialengineering.usbdebugging --server ip -credentials username password drozer console connect --server ip:port --password Writing a module Binder fuzz Why use drozer? I am familiar with it,XD! • fuzz intent • fuzz service call Fuzz model • drozer module(core) • external python script(control logic) All in the one drozer module is OK Case Share • LockScreen bypass(or clear) • Fake shutdown (eavesdropping) • Capability leak • System Dos LockScreen bypass(CVE-2016-3749) CVE-2016-3749 Details Windfall CVE-2016-3749 Patch My first high severity issue Fake Shutdown(eavesdropping) • Samsung Capability Leak • nexus series car mode • samsung change theme Video demonstration System Dos(restart) • nexus(3 ) Video demonstration. • samsung(11 )

pdf文档 2016-《Binder Fuzz based on drozer》

安全研究库 > 网络论坛材料 > 2016 Kcon > 文档预览
30 页 0 下载 34 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2016-《Binder Fuzz based on drozer》 第 1 页 2016-《Binder Fuzz based on drozer》 第 2 页 2016-《Binder Fuzz based on drozer》 第 3 页 2016-《Binder Fuzz based on drozer》 第 4 页 2016-《Binder Fuzz based on drozer》 第 5 页
下载文档到电脑,方便使用
还有 25 页可预览,继续阅读
本文档由 张玉竹2022-04-08 10:15:10上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言