Defeating Samsung KNOX with Zero Privilege

6bPuEfHSYOc/default.jpg

In this talk I will describe how I used an exploit chain to defeat the new Samsung KNOX with zero privilege (exploit chain can be executed by any untrusted application), including KASLR bypassing, DFI bypassing, SELinux fully bypassing and privilege escalation. All details of vulnerabilities and mitigation bypassing techniques will be given during the presentation.

By Di Shen

Full Abstract & Presentation Materials: https://www.blackhat.com/us-17/briefi...

6bPuEfHSYOc/default.jpg
Defeating Samsung KNOX with Zero Privilege Defeating Samsung KNOX with Zero Privilege Reviewed by Anonymous on May 04, 2018 Rating: 5