Android exploit using Signed Certificates null Pune Meet 10 December 2016 Monthly
Abstract
A custom exploits can be created by embedding relatively malicious payloads in to an Android's executable. APK files. And then signing them in order to make them trust worthy so that targeted systems will consider it as from trusted or original source. Hence, an application will be successful to be executed on target side and simultaneously it will be providing a permanent backdoor to an attacker's system.
Speaker
Timing
Starts at Saturday December 10 2016, 11:00 AM. The sessions runs for 15 minutes.