{"id":12250,"date":"2014-01-18T14:29:58","date_gmt":"2014-01-18T20:29:58","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=12250"},"modified":"2014-01-18T14:29:58","modified_gmt":"2014-01-18T20:29:58","slug":"vpn-related-vulnerability-discovered-on-an-android-device","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=12250","title":{"rendered":"VPN Related Vulnerability Discovered on an Android device"},"content":{"rendered":"<blockquote><p>In this\u00a0<a href=\"https:\/\/www.dropbox.com\/s\/u9dbu0nolnlmq69\/20140116_220351.mp4\" target=\"_blank\">video<\/a>\u00a0we demonstrate the vulnerability via the following steps:<\/p>\n<ol dir=\"ltr\">\n<li>We present a regular Android device (in this case it is the popular Samsung S4 device). Behind it we display a screen with packet capturing tool, showing the traffic that flows through that computer.<\/li>\n<li><strong>Now the user runs the malicious app<\/strong> and clicks on the Exploit button which takes advantage of the vulnerability in the phone\u2019s system.<\/li>\n<\/ol>\n<\/blockquote>\n<p>via <a href=\"http:\/\/cyber.bgu.ac.il\/blog\/vpn-related-vulnerability-discovered-android-device-disclosure-report\">VPN Related Vulnerability Discovered on an Android device &#8211; Disclosure Report | Cyber Security Labs @ Ben Gurion University<\/a>.<\/p>\n<p>The exploit vector requires a user to do something.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this\u00a0video\u00a0we demonstrate the vulnerability via the following steps: We present a regular Android device (in this case it is the popular Samsung S4 device). Behind it we display a screen with packet capturing tool, showing the traffic that flows &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=12250\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[285],"tags":[48,1125,698,257],"class_list":["post-12250","post","type-post","status-publish","format-standard","hentry","category-cpe","tag-android","tag-exploit-vector","tag-security-research","tag-vpn"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12250"}],"version-history":[{"count":1,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12250\/revisions"}],"predecessor-version":[{"id":12251,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12250\/revisions\/12251"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12250"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}