• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones

November 18, 2018 by Connor Fairman Leave a Comment

There was a hacking competition held in Tokyo where hacker teams from around the word were encouraged to attempt to hack into wifi-connected mobile devices, such as the iPhone X, Samsung Galaxy s9, and Xiaomi Mi6. Every single device was hacked by at least one of the teams. For the iPhone X, a team was able to gain access to the phone through a Just in Time (JIT) attack, and ended up stealing a recently deleted photo on the phone. For the Samsung, a team exploited a memory heap overflow vulnerability. Many exploitations that I’ve read about involve exploiting the heap part of memory and either causing an overflow or a seg fault. Competitions like this are a great way for companies to gain awareness about the kinds of vulnerabilities faced by their devices.

https://thehackernews.com/2018/11/mobile-hacking-exploits.html

Filed Under: Week 12: Web Services Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in