AT Command Injection on the LG G4 Smartphone

preview_player
Показать описание
We leverage an unauthenticated AT command interface present in the LG G4 and other LG devices to bypass the lockscreen, control the touchscreen, and leak sensitive data.

Based off on the work from our paper "ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem". Appeared at USENIX Security 2018.

Narrated by Grant Hernandez
Рекомендации по теме
Комментарии
Автор

Awesome work. Never thought those AT commands I spent so much time playing with in the 80s and 90s would even be a thing any more.

ebrandel
Автор

thank you for this information. great work

antoniopaludo
Автор

Does this Smartphone (or another one) have ATD command for dial? I would like to call a remote GSM modem (using 1 slot, i.e. 9600bps, which the GSM network see as usual voice call (I suppose).

mm
Автор

Is this command can work even if the mobile has password 🤔

abdelhameedabdelazeem
Автор

can you kindly tell me the two set of commands you used to bypass the usb connection prompt

bridgetpatience
Автор

Is there anyway to know that AT command you used to Authorize ADB? I have LG K520 as my test device, and switching USB mode to adb works great, but device does not show authorization popup. I was just wondering if it is possible to authorize without popup too.

shadabmozaffar
Автор

3m21s - did you intend to show that At command, or did you intend to start pixalating a few seconds before?

eggz
Автор

Is this attack effective against Android 7/8/9?

PeterMcIntyre
welcome to shbcf.ru