Android Hacking Village

Nullcon 2012

12 February 2012

Android Village

We organized first ever android village in nullcon 2012.

Anything and everything you wanted to know about your Android Smart phone, from rooting, exploitation, malware to pentesting and Moding.

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This two-day Android Hacking Village workshop provides comprehensive coverage of Android security, from architecture fundamentals and application development through malware analysis, ROM cooking, exploit techniques, and penetration testing methodologies.

Key Topics Covered

Day 1 - Fundamentals:

Android Architecture:

Security Model - The Good:

Security Model - The Bad:

Application Development:

Day 2 - Advanced Topics:

Android Threat Model:

Notable Malware:

Exploit Techniques:

ROM and Rooting:

Actionable Takeaways

  1. Android security spans multiple layers from OS kernel to application logic
  2. The permission model, while useful, places too much trust in end-users
  3. Malware evolution on Android mirrors PC malware history
  4. Privilege escalation exploits target fundamental OS mechanisms (setuid, Ashmem)
  5. ROM security review is critical for any corporate Android deployment