Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote Attack Surface

Автор: Black Hat

Загружено: 2025-02-27

Просмотров: 4246

Описание:

Instant messaging application (such as iMessage and WhatsApp) is an important remote attack surface for smartphones, often used by spyware as the first step in APT attacks, and has received great attention in the past.

Carrier Based video calling, as a native video calling feature of mobile phones, is also a major remote attack surface for smartphones.

We have discovered fatal 0-day vulnerabilities in some native Carrier Based video calling of mobile phones, which have been present for at least 7 years. As long as the target accepts our video call invitation, we can exploit these vulnerabilities to remotely obtain code execution permissions for the target phone's system.

In this session, we will introduce this remote attack surface we have discovered and provide a few examples to illustrate the potential issues and impacts that may arise within this attack surface.

By:
Qinrun Dai | PhD Student, University of Colorado Boulder
Fan Yang | Security Researcher, Singular Security Lab
Haikuo Xie | Security Researcher, Singular Security Lab

Full Abstract and Presentation Materials Available:
https://www.blackhat.com/us-24/briefi...

Remote, One-Click, Breaking through Smartphones via a Non Well-Known Remote Attack Surface

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Secure Shells in Shambles

Secure Shells in Shambles

Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls

Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls

15 Ways to Break Your Copilot

15 Ways to Break Your Copilot

DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin  Yu

DEF CON 33 - Gateways to Chaos - How We Proved Modems Are a Ticking Time Bomb - Chiao-Lin Yu

AI Security Chaos at Black Hat 2025: Can We Even Keep Up?

AI Security Chaos at Black Hat 2025: Can We Even Keep Up?

Practical LLM Security: Takeaways From a Year in the Trenches

Practical LLM Security: Takeaways From a Year in the Trenches

Compromising LLMs: The Advent of AI Malware

Compromising LLMs: The Advent of AI Malware

Перетест Ai MAX+ 395 в жирном мини-ПК и тест AMD 8060s vs Intel B390

Перетест Ai MAX+ 395 в жирном мини-ПК и тест AMD 8060s vs Intel B390

System Design Concepts Course and Interview Prep

System Design Concepts Course and Interview Prep

You've Already Been Hacked: What if There Is a Backdoor in Your UEFI OROM?

You've Already Been Hacked: What if There Is a Backdoor in Your UEFI OROM?

I Am Whoever I Say I Am: Infiltrating Identity Providers Using a 0Click Exploit

I Am Whoever I Say I Am: Infiltrating Identity Providers Using a 0Click Exploit

Android Exploits 101 Workshop

Android Exploits 101 Workshop

Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021

Monitoring Surveillance Vendors: A Deep Dive into In-the-Wild Android Full Chains in 2021

ПВО ударила по дому. Облава на москвичей. Состояние Кадырова. Собчак и «Голая вечеринка»-2 | ВОЗДУХ

ПВО ударила по дому. Облава на москвичей. Состояние Кадырова. Собчак и «Голая вечеринка»-2 | ВОЗДУХ

DEF CON 33 - Intro to Physical Security Bypass - Karen Ng, Matthew Cancilla

DEF CON 33 - Intro to Physical Security Bypass - Karen Ng, Matthew Cancilla

Process Injection: Breaking All macOS Security Layers With a Single Vulnerability

Process Injection: Breaking All macOS Security Layers With a Single Vulnerability

The Living Dead: Hacking Mobile Face Recognition SDKs with Non-Deepfake Attacks

The Living Dead: Hacking Mobile Face Recognition SDKs with Non-Deepfake Attacks

#HITB2023AMS D1T1 - Current State Of IOS Malware Detection - Matthias Frielingsdorf

#HITB2023AMS D1T1 - Current State Of IOS Malware Detection - Matthias Frielingsdorf

The Dark Side of EDR: Repurpose EDR as an Offensive Tool

The Dark Side of EDR: Repurpose EDR as an Offensive Tool

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com