Forwarded from BlackBox (Security) Archiv
Protect your information from physical threats
π‘ ππΌ Table of Contents ππΌ
π ππΌ What you can learn from this guide
π ππΌ Assessing your risks
π ππΌ Creating your physical security policy
π ππΌ Protecting your information from physical intruders
π ππΌ Software and settings related to physical security
π ππΌ Maintaining a healthy environment for your equipment
π ππΌ Further reading
π‘ π ππΌ https://securityinabox.org/en/guide/physical/
#security #physical #information #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
π‘ ππΌ Table of Contents ππΌ
π ππΌ What you can learn from this guide
π ππΌ Assessing your risks
π ππΌ Creating your physical security policy
π ππΌ Protecting your information from physical intruders
π ππΌ Software and settings related to physical security
π ππΌ Maintaining a healthy environment for your equipment
π ππΌ Further reading
π‘ π ππΌ https://securityinabox.org/en/guide/physical/
#security #physical #information #guide
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
securityinabox.org
Protect against physical threats
Media is too big
VIEW IN TELEGRAM
Physical Attacks Against Smartphones
Android devices are constantly improving their security to protect against attackers with physical access, with new protection techniques being added year-by-year. This talk aims to demonstrate vulnerabilities in modern Android smartphones that are still viable, despite the mitigations in place.
In the first phase of this talk, we will discuss the analysis and exploitation of vendor-customized versions of Android's Recovery mode, demonstrating weaknesses that allow for privilege escalation to root, and traversal from Recovery to Android, without Bootloader access....
By: Christopher Wade
Full Abstract and Presentation Materials:https://www.blackhat.com/us-23/briefings/schedule/#physical-attacks-against-smartphones-32485
#Android #Vulnerabilities #RecoveryMode #Exploit #PrivilegdeEscalation #Root
Android devices are constantly improving their security to protect against attackers with physical access, with new protection techniques being added year-by-year. This talk aims to demonstrate vulnerabilities in modern Android smartphones that are still viable, despite the mitigations in place.
In the first phase of this talk, we will discuss the analysis and exploitation of vendor-customized versions of Android's Recovery mode, demonstrating weaknesses that allow for privilege escalation to root, and traversal from Recovery to Android, without Bootloader access....
By: Christopher Wade
Full Abstract and Presentation Materials:https://www.blackhat.com/us-23/briefings/schedule/#physical-attacks-against-smartphones-32485
#Android #Vulnerabilities #RecoveryMode #Exploit #PrivilegdeEscalation #Root