Power BI Fundamentals - Create visualizations and dashboards from scratch
Free AI-powered learning to build in-demand skills
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore advanced Android security exploitation techniques in this conference talk focusing on attacking the Android Binder to achieve universal root access. Learn about fuzzing methodologies specifically tailored for the Android Binder system, understand the intricacies of Android's inter-process communication mechanisms, and discover potential vulnerabilities that could lead to system-wide privilege escalation. Gain insights from security researchers as they demonstrate practical approaches to identifying and exploiting weaknesses in Android's core components, providing valuable knowledge for both offensive security professionals and Android platform developers interested in enhancing system security.
Syllabus
OffensiveCon24 - Eugene Rodionov,Zi Fan Tan and Gulshan Singh
Taught by
OffensiveCon