Description: A talk Delivered at Brucon 2011 and Securi-Tay 2011 conferences by Nick Walker (@tel0seh) and Werner Nel (@WernerNel). The talk discusses the current state of Android security, and how its weaknesses can be leveraged to compromise a corporate network that it is a client within. The hack involves multiple stages: Remote exploitation of the handset, Privilege Escalation to root, Post -Exploitation tricks, and then pivoting over the phone via it's 3g interface, and compromising a network via it's wifi interface and metasploit.
Tags: android , hacking , metasploit , root , linux , security , udev , remote , walkthrough ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Interesting to listen to, unfortunately the video is basically useless(too hard to see)