In this video we demonstrate the vulnerability via the following steps:
- We present a regular Android device (in this case it is the popular Samsung S4 device). Behind it we display a screen with packet capturing tool, showing the traffic that flows through that computer.
- Now the user runs the malicious app and clicks on the Exploit button which takes advantage of the vulnerability in the phone’s system.
The exploit vector requires a user to do something.