Published July 27, 2017
In this talk I will describe how I used an exploit chain to defeat the Samsung KNOX 2.6 with zero privilege, including KASLR bypassing, DFI bypassing, SELinux fully bypassing and privilege escalation.
Nov 3, 2016 by
Jul 1, 2016 by
@returnsme. Security Researcher of @keen_lab.