Friday, March 18, 2016

How to hack your Android device – Macworld

The paper explains in great detail how to step three you build own exploits and thus hijack an Android device. The victim before just need to surf to a malicious Web page that serves a video that allows crashing the media server operating system. If that happens android normally ensures that the internal state of this server is reset. The malicious page, meanwhile, is a Javascript process that keeps track of when the media server is restarted and send as much information about the attacked device to the server of the attacker

.

the server then generates a video to the device sent which makes abuse of the Stage Fright leak for more information to determine the status of the device and return it to the server of the attacker. On the basis of this additional information is finally a third video generated and sent in combination with other malware that is carried out on the device of the victim. The malicious code, which is executed on the infected Android device can take its course with all the rights it needs to spy further the device.

The exploit, which is called by the researchers Metaphor, so does require that the attacker in advance has a server at his disposal in which the malicious code is ready and when the outdated information must come in.

the bottom line is that you, as the attacker must find out in what place will be loaded along with the jemalloc configuration in the memory of the Android device libc.do and libcui8n.so. That is the reason why the earlier mentioned Javacript-code is required. The information that retrieves the code indicates which parts of memory and firmware can be attacked

On the next page:. Not difficult, but tedious

LikeTweet

No comments:

Post a Comment