Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 2-5, 2019
London UK
01:00 PM
Black Hat Staff
Black Hat Staff
Event Updates

Black Hat USA 2016: Mobile Hacking

Over 1.4 billion people across the world are using Android devices, according to Google. Unlike Apple's iOS, Android is not tied to a specific manufacturer, allowing it to account for 81.6% of the smartphone operating system market (Statistica). However, since Android dominates the smartphone market, it presents an ideal opportunity for hackers to tap into a large base of user information. It's essential for Android users, as well as iOS users, to learn how to protect themselves.

Mobile Hacking

Can You Trust Me Now? An Exploration Into the Mobile Threat Landscape gives an overview of the entire mobile ecosystem. Learn everything from the hardware components to the operating systems of myriad mobile devices. This Briefing reveals the vulnerabilities that mobile devices encounter today and the threats that are projected to arise in the future. Mobile trusted computing has limitations, which can leave your device exposed to any experienced hacker who breaks through the trust. If your device is compromised, it can often be difficult to detect. This talk will present real-world tactics to enhance your security to keep your information protected.

Adaptive Kernel Live Patching: An Open Collaborative Effort To Ameliorate Android N-Day Root Exploits reveals that Android’s biggest threat to users is its kernel vulnerability. It is common for underground businesses to use kernel vulnerabilities in their malware and APTs. It’s extremely difficult to patch vulnerable devices at scale, due to a large number of vendors not providing up-to-date kernel source code for all of their devices. This talk presents the adaptive Android live patching framework, which offers access to live patching for kernels and multiple advantages for developers.

In addition to the mobile threats directed at Android users, the Pangu 9 Internals Briefing exposes some of the security threats iOS users can encounter. Pangu 9 is considered the first unbound jailbreak tool that offered hackers access to the iOS 9. Fortunately, iOS 9.2 fixed the dangerous bug but there were no specific details disclosed on how the security problem was resolved. This talk offers an inside look at the logical error in the system that created the original vulnerability and an additional new vulnerability in the backup-restore process.

If you want to test Android and iOS platforms yourself, the Mobile Application Bootcamp - Journeyman Level Training teaches attendees the techniques hackers use to attack mobile devices overall. Learning how mobile hacking is accomplished will provide greater insight into the methods you can use to protect your own information. Attendees will learn how to conduct penetration testing through a series of lectures, labs, demonstrations, and group exercises. If you’re interested in security testing specifically designed for Android devices, the Android Application Hacking - Pentesting and Reversing Mobile Apps Training offers in-depth techniques on how to perform static analytics, traffic manipulation, debugging, and more!

Black Hat USA 2016 Trainings run July 30 - August 2, with both 2-day and 4-day classes available. Then the Briefings will be presented August 3 and 4. Comprehensive event information can be found at blackhat.com/us-16/.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. ...
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue...
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the...
PUBLISHED: 2020-02-21
Certain Xerox WorkCentre printers before 073.xxx.000.02300 do not require the user to reenter or validate LDAP bind credentials when changing the LDAP connector IP address. A malicious actor who gains access to affected devices (e.g., by using default credentials) can change the LDAP connection IP a...
PUBLISHED: 2020-02-21
In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.