Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bypassing Intent Destination Checks - LaunchAnyWhere Privilege Escalation

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical Android security vulnerability in this DEF CON 33 conference talk that demonstrates how the supposedly patched LaunchAnywhere vulnerability can still be exploited. Learn about the BadResolve technique, a new exploitation method that bypasses Google's and device vendors' destination component checks, allowing zero-permission applications to invoke protected activities with system-level privileges. Discover how this vulnerability affects all Android versions, including Android 16, and understand the security implications of these persistent weaknesses. Examine the speaker's methodology for identifying exploitable methods in both AOSP and vendor-specific closed-source implementations using LLM Agents and MCP (Model Context Protocol). Gain insights into the evolution of Android security patches and why current defenses remain insufficient against sophisticated attack vectors. Understand the real-world impact of these vulnerabilities, which have been actively exploited in the wild and confirmed by Google, leading to new security patches.

Syllabus

DEF CON 33 - Bypassing Intent Destination Checks, LaunchAnyWhere Privilege Escalation - Qidan He

Taught by

DEFCONConference

Reviews

Start your review of Bypassing Intent Destination Checks - LaunchAnyWhere Privilege Escalation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.