Bouncer Land

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=CbbJcVqCVBQ



Duration: 57:08
2 views
0


Meet *. He is a single function app that wanted to be much more. He always looked up those elite malware and botnet apps but now that the Google's Bouncer moved into town his hopes and dreams appeared to be shattered. This was until he was handed text file while strolling along a shady part of the Internet (AKA Pastebin). The title of this txt file was "Bypassing Google's Bouncer in 7 steps for Fun and Profit". Upon reading this, our little app began to glow with excitement. He routed himself all the way to the gates of Google Play and began his journey from a simple benign app that , to a full-fledged info stealing botnet warrior. In this presentation will tell the story of how our little app beat the Bouncer and got the girl (well, at least all her personal information, and a few naughty pics).

* Our little buddy is still having fun in the market and we don't want anyone playing around with him right now, even you CFP reviewers.Black Hat - USA - 2012 Hacking conference

Presented By:
Nicholas Percoco
Sean Schulte
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
crime
password
code
web
thief
protection
network
scam
fraud
secure
identity
criminal
phishing
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Nicholas Percoco
Sean Schulte