11bff3b947d4900667ac1b1bc9d635bf

Abstract

A custom exploits can be created by embedding relatively malicious payloads in to an Android's executable. APK files. And then signing them in order to make them trust worthy so that targeted systems will consider it as from trusted or original source. Hence, an application will be successful to be executed on target side and simultaneously it will be providing a permanent backdoor to an attacker's system.

Speaker

Hiren Bhensdadia

Timing

Starts at Saturday December 10 2016, 11:00 AM. The sessions runs for 15 minutes.

Resources