{"id":234250,"date":"2020-08-07T07:10:56","date_gmt":"2020-08-07T05:10:56","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=234250"},"modified":"2020-08-07T14:57:22","modified_gmt":"2020-08-07T12:57:22","slug":"android-devices-per-exploit-chain-remote-rooten","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2020\/08\/07\/android-devices-per-exploit-chain-remote-rooten\/","title":{"rendered":"Android-Devices per Exploit-Chain remote rooten"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2012\/07\/android.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>Aktuell findet die Blackhat 2020 als virtuelle Konferenz statt. Dort pr\u00e4sentieren Sicherheitsforscher ihre Erkenntnisse. Ein Sicherheitsforscher pr\u00e4sentiert auf der Blackhat 2020, wie er \u00fcber eine Kette von Exploits ein Android-Ger\u00e4te remote rooten kann.<\/p>\n<p><!--more--><\/p>\n<p>Ich bin grade auf den betreffenden Tweet gesto\u00dfen &#8211; auf Github gibt es <a href=\"https:\/\/github.com\/secmob\/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices\" target=\"_blank\" rel=\"noopener noreferrer\">einige Hinweise<\/a> dazu.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Share the white paper and slide of TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices I presented <a href=\"https:\/\/twitter.com\/BlackHatEvents?ref_src=twsrc%5Etfw\">@BlackHatEvents<\/a> <a href=\"https:\/\/t.co\/3LfQpaeKoe\">https:\/\/t.co\/3LfQpaeKoe<\/a><\/p>\n<p>\u2014 Guang Gong (@oldfresher) <a href=\"https:\/\/twitter.com\/oldfresher\/status\/1291506618782248960?ref_src=twsrc%5Etfw\">August 6, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aktuell findet die Blackhat 2020 als virtuelle Konferenz statt. Dort pr\u00e4sentieren Sicherheitsforscher ihre Erkenntnisse. Ein Sicherheitsforscher pr\u00e4sentiert auf der Blackhat 2020, wie er \u00fcber eine Kette von Exploits ein Android-Ger\u00e4te remote rooten kann.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4308,4328],"class_list":["post-234250","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-android","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/234250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=234250"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/234250\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=234250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=234250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=234250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}