Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть #HITB2024BKK

  • Hack In The Box Security Conference
  • 2024-10-30
  • 773
#HITB2024BKK
hitbhitbsecconfhackinthebox
  • ok logo

Скачать #HITB2024BKK бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно #HITB2024BKK или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку #HITB2024BKK бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео #HITB2024BKK

The popularity of the Flutter mobile application framework has surged in recent years, thanks to its versatility and ease of use. However, because Flutter is still relatively new, accessibility issues frequently arise in applications created with it. Consequently, developers have resorted to hardcoding sensitive information, such as keys and secret credentials, directly into their applications. Unfortunately, this practice poses significant security risks, especially with the emergence of new reverse engineering tools that can compromise supposedly secure data.

One such tool is B(l)utter, designed specifically for reverse engineering Flutter applications. With B(l)utter, developers can extract metadata and analyze compiled code, revealing symbols represented through a combination of pseudo code and assembly instructions. Leveraging this tool, I conducted a statistical analysis of 100 Flutter applications and made alarming discoveries. Among them, seven applications contained hardcoded information, potentially exposing them to exploitation. Shockingly, one of these apps included a private cryptographic key belonging to a widely used application boasting over 5 million users.
These vulnerabilities have serious ramifications since they may provide unauthorized access to private information or services.

In this session, I aim to demonstrate the methodology behind my research. We will delve into the process of gathering Flutter applications, utilizing the B(l)utter tool, and analyzing the decompiled data. Furthermore, I will provide detailed insights into my findings, including developmental stage information, exposed cryptographic keys, access tokens, and API keys. Developers and other stakeholders must be aware of the dangers that hardcoded credentials bring, and they must act quickly to fix these vulnerabilities.

===


I am a penetration tester specializing in mobile security, with an interest in reverse engineering, vulnerability research, and bug bounty programs. Currently, I am conducting research on the vulnerabilities of Flutter mobile applications.

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]