Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Headphone Jacking - A Key to Your Phone

WEareTROOPERS via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about a sophisticated mobile security attack vector in this conference talk that explores how headphone jacks can be exploited as an entry point to compromise smartphones. Discover the technical mechanisms behind headphone jacking attacks, understand how malicious actors can leverage audio interfaces to gain unauthorized access to mobile devices, and examine the security implications of seemingly innocuous hardware connections. Explore the attack methodology, potential payloads that can be delivered through audio ports, and defensive strategies to protect against this unconventional but effective penetration technique. Gain insights into the broader implications for mobile device security and the importance of considering all hardware interfaces as potential attack surfaces in modern cybersecurity threat modeling.

Syllabus

TROOPERS25: Headphone Jacking - A Key to Your Phone

Taught by

WEareTROOPERS

Reviews

Start your review of Headphone Jacking - A Key to Your Phone

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.