Completed
lessons learned
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking the Jolla - An Intro to Assessing A Mobile Device
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 History of Nokia
- 3 Smart Back Cover
- 4 Attack Surface
- 5 Device Topology
- 6 Partitions
- 7 Boot Image
- 8 Binwalk
- 9 MakeBoot
- 10 Boot Image Structure
- 11 Image Signing
- 12 Recovery Fastboot
- 13 Recovery Menu
- 14 Troubleshooting
- 15 Security Code
- 16 Bbbc
- 17 Device UI
- 18 Boot Process
- 19 HMAC
- 20 RestoreLock
- 21 StoreLock
- 22 Ruby
- 23 Operating System
- 24 Device
- 25 Application Layer
- 26 Userland
- 27 Local Attack Surface
- 28 SIM Kit
- 29 SD Card Path
- 30 grep
- 31 path
- 32 fuzz
- 33 init script
- 34 fun example
- 35 another fun example
- 36 shellshocked
- 37 lessons learned
- 38 kernel panic
- 39 kernel security
- 40 dbus
- 41 dbus sniffer
- 42 dbus map
- 43 dbus code
- 44 dbus sent
- 45 user interaction
- 46 import contacts
- 47 thirdparty apps
- 48 platform
- 49 proxy
- 50 tips
- 51 Apps
- 52 Invoke
- 53 Hardware
- 54 NFC Tag
- 55 Developer Kit
- 56 Thanks