Get 20% off all career paths from fullstack to AI
Master Windows Internals - Kernel Programming, Debugging & Architecture
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a critical Android security vulnerability in this DEF CON 33 conference talk that demonstrates how the supposedly patched LaunchAnywhere vulnerability can still be exploited. Learn about the BadResolve technique, a new exploitation method that bypasses Google's and device vendors' destination component checks, allowing zero-permission applications to invoke protected activities with system-level privileges. Discover how this vulnerability affects all Android versions, including Android 16, and understand the security implications of these persistent weaknesses. Examine the speaker's methodology for identifying exploitable methods in both AOSP and vendor-specific closed-source implementations using LLM Agents and MCP (Model Context Protocol). Gain insights into the evolution of Android security patches and why current defenses remain insufficient against sophisticated attack vectors. Understand the real-world impact of these vulnerabilities, which have been actively exploited in the wild and confirmed by Google, leading to new security patches.
Syllabus
DEF CON 33 - Bypassing Intent Destination Checks, LaunchAnyWhere Privilege Escalation - Qidan He
Taught by
DEFCONConference