SlideShare a Scribd company logo
1 of 83
Download to read offline
Hacking Card Emulation:
how to clone any Android
HCE contactless card
Sławomir Jasek
slawomir.jasek@securing.pl
slawekja
Confidence, Kraków 18.05.2017
https://www.youtube.com/watch?v=NHiO18iYNKA
Cloning
1996: Dolly the sheep
Cloning
1996: Dolly the sheep
2001: cat „CopyCat”
2003: horse
Humans? Why no humans?
I. Commercial – no commercial interest in industries
II. Ethical/legal – beliefs, laws...
III. Technical - pets easy, primates very hard
Are we sure?
2017 – mobile contactless payment cards cloning?
I. Commercial
https://www.statista.com/statistics/461512/nfc-mobile-payment-users-worldwide/
2017 – mobile contactless payment cards cloning?
I. Commercial
II. Ethical/legal
III. Technical
https://www.statista.com/statistics/461512/nfc-mobile-payment-users-worldwide/
Technical countermeasures
https://www.flickr.com/photos/un_photo/6872103103/www.wordclouds.com
https://www.flickr.com/photos/mujitra/8606262790/
HCE TECHNOLOGY
„Secure Element” (since 2007)
OS
Mobile app
Applet NFC Antenna
Card data, payment services
SE communicates directly with NFC
• Apps and OS have no access to card
data and to communication during
payment.
Secure Element
SE dominance hierarchy clashes
Banks vs mobile operators,
handset manufacturers,
payment service providers...
Painful process
- special SIM required
- limited support
https://www.flickr.com/photos/jsouthorn/6616455243/
Google vs Isis Wallet
2011: Google Wallet with Galaxy Nexus
embedded SE
Isis wallet (AT&T, Verizon, T-Mobile) -
blocked Google Wallet for their devices.
Google: we will go our way - without SE.
Host Card Emulation
Android >=4.4, Blackberry OS, Windows
Phone
No need for troublesome Secure Element,
moved to „cloud”.
Software emulates contactless smart card.
OS
Payment app
How does it work?
INTEGRATION
How to embed it in mobile app?
• Own implementation
• External, „blackbox”
library
- Visa, Mastercard SDK
- several other products
https://www.flickr.com/photos/lluniau_rich/580859948/
Vendors’ doc
Vendors’ doc
Mobile phone (Android 4.4 +)
Bank’s mobile app
HCE Applet
NFC controller
HCE API
„Secure
Element in the
Cloud”
SDK
API
Sławomir Jasek
Enjoy appsec (dev, break, build...)
since 2003.
Pentesting, consultancy, training -
web, mobile, embedded...
Significant part of time for research.
-> kariera@securing.pl
HOW TO STEAL THE
MONEY?
Right, so how to steal the money?
http://en.wikipedia.org/wiki/Olsen_Gang
Steal the phone?
immediate report and cancel
https://twitter.com/thereaIbanksy/status/842853661407678464
Steal card data via NFC?
Credit card reader?
Let’s try!
The screen has to be on. In some cases
unlock is required.
You won’t make online payments using it.
Creating magstripe track may be possible.
https://play.google.com/store/apps/details?id=
com.github.devnied.emvnfccard
Tokenization
Random card numbers (tokens) replacing single static PAN
Limited „domain” use – only for contactless transactions
4485 7332 2613 9733
So, how are the EMV transactions executed?
a
EMV crypto
tokenized
PAN
The key
How to steal it? OS
Mobile app
Intercept in transfer?
"Secure
Element in
the cloud"
server
Google Cloud
Messaging
Mobile wallet
server
Typically
Multiple servers, push included
Certificate pinning
Second layer encryption
"encryptedData":"AAABdxcgfXea9B050gH9/a1fcJz//UpQihZrvfdHwZboTo3kNN45M0
eemFMrM1EM0BzixsDHTMFeUenl9CKMjsbJT/IvZZGceL5KmQK971NoI5wo8Kh5qgF/hazsU
2uOlyu5NxsE69QE62cffruh55DvX8f7/g=="
Flaws?
Improper pinning – accept all certs, use vulnerable lib...
Nasty bugs „deeply hidden” under the proprietary
encryption layer.
- Difficult to exploit, need active access to transmission
during provisioning.
The key
How to steal it?
• Intercept in transfer?
Stored in user-space – not hardware Secure
Element.
• Get it from the phone?
OS
Mobile app
Mobile malware?
Most common:
• Overlay stealing data
• Intercept SMS
• ...
• Does not have access to card
data (private folder of the app)
https://www.flickr.com/photos/freejay3/3335151608/
How to access the data?
https://en.wikipedia.org/wiki/The_Creation_of_Adam
root = GOD
Malware with root?
Sources: Ars Technica, Threatpost, Trend Micro, Hackread
Key stored on the device
Stored in user-space – not hardware
Secure Element.
How to steal it?
• Intercept in transfer?
• Get it from the phone? Root malware!
But the key is encrypted... How to decrypt?
OS
Mobile app
Decompile the app binary?
Encryption
Does not require user interaction (no PIN/pass).
Works also when phone is offline.
So, what can we do to clone the card?
data
stored on
the phone
hardcoded in
app
Install the same app, copy data?
OS
Mobile app
OS
Mobile app
Let’s try with Android
Pay
https://www.flickr.com/photos/136682034@N03/26086288495/
Live demo
Cloning script
tar
chown
restorecon
https://www.flickr.com/photos/alijava/27634909445
backup.sh
<redacted>
restore.sh
<redacted>
Other applications?
OS
Mobile app
OS
Mobile app No, it does not work 
The key is tied to specific
device
Encryption again
data
stored on
the phone
hardcoded in
app
ID
Device-specific
characteristic
How about exactly same hardware device?
OS
Mobile app
OS
Mobile app
Same model, OS
version, IMEI...
Works!
In most cases you need to copy also other user data
(not just the payment app)
Not really practical attack on a mass scale...
How to make it to a different device?
OS
Mobile app
OS
Mobile app
Xposed Framework
Change behavior of system and apps
Can spoof device characteristics
OS
Xposed
(intercepts
calls)
Mobile app
OS
Mobile app
DeviceID?
3882343...
OS
Xposed
Mobile app
DeviceID?
6666666...
Standard
device
Xposed -
framework
+ module
changing ID
Xposed – helps to imitate original device
OS
Xposed
Mobile app
OS
Mobile app
The key is tied to specific
device
Real risk?
We made a single 1 PLN
transaction.
The payment keys are limited use,
then have to be replenished.
Transactions > 50 PLN have to be
authorized by PIN.
https://www.flickr.com/photos/tambako/3655641638/
KEYS REPLENISHMENT
Keys replenish – most common: GCM combined
"Secure
Element in
the cloud"
server
Google Cloud
Messaging
Mobile wallet
server
This part we already have
Mobile wallet
server
Not able to
determine attacker
vs original user
How to hijack GCM push?
"Secure
Element in
the cloud"
server
Google Cloud
Messaging
Hijack GCM push
Copy relevant user data (/data/system/users, ...)
Both devices have same AndroidID, keys, subscriptions
Test push received by:
- sometimes both
- only one (mostly „cloned”)
- I can block original user
data data
Having root access to victim’s phone
- Make few low-value transactions
from another device
- Make multiple transactions (renew
limited-use keys)
- But transacions > 50 PLN need to
be authorized by PIN
https://www.flickr.com/photos/tambako/
FLOOR LIMIT
The „floor limit”
Transactions > 50 PLN need authorization –
mostly enter the PIN on terminal.
BUT - how do you set up the PIN?
Mobile malware -> can sniff the PIN / trick
user into entering it
CDCVM
Consumer Device Cardholder Verfification Method
a
Malware=steal
the PIN
On-device
cardholder
verification
(e.g. PIN)
EMV crypto
CDCVM – not very common
< 20% apps support it
So what if application does not support CDCVM?
CDCVM API methods in HCE library?
API method names (cannot be obfuscated)
setCvmVerificationMode(CvmMode
paramCvmMode);
setCvmVerified(boolean paramBoolean);
Patch the application - smali?
const/4 v9, 0x1
invoke-interface {v8,v9}, L<redacted>;->setCvmVerified(Z)V
new-instance v9, L<redacted>/CvmMode;
sget-object v10, L<redacted>/VerifyingEntity;->MOBILE_APP:
L<redacted>/VerifyingEntity;
sget-object v11, L<redacted>/VerifyingType;->PASSCODE:
L<redacted>/VerifyingType;
invoke-direct {v9, v10, v11}, L<redacted>/CvmMode;-><init>
(L<redacted>/VerifyingEntity;L<redacted>/VerifyingType;)V
invoke-interface {v8, v9}, L<redacted>;->setCvmVerificationMode
(L<redacted>/CvmMode;)V
CDCVM in app which does not support it ;)
a
Patched app
On-device
cardholder
verification
EMV crypto
Having root access to victim’s phone
- Make few low-value transactions
from another device
- Make multiple transactions
(renew limited-use keys)
- Make transactions on higher
amounts
TESTED APPS
Other applications
Most banks think of/are during/after implementation.
We have tested 9 apps and proved cloning possible in
all of them.
Others we can estimate based on libs used.
The easiest one
Simple device checks
No root detection
No GCM push for
replenish
http://shaunthesheep.wikia.com/wiki/File:Pushing_Shirley.jpg
The hardest one
Checks multiple device characteristics
Native lib root detection
Good integrity checks and obfuscation
Had to use unrooted phone - same
model, with cloned IMEI
WHAT CAN WE DO
BETTER?
Don’t be the last one...
Check for more device characteristics?
Device serial, IMEI
SIM serial/IMSI
Display size?
CPU?
Sensors?
https://www.flickr.com/photos/volvob12b/11248541865/
Root detection
Craft your own
Google SafetyNet Attestation API
• detects: rooting, custom ROM, low
level malware...
RootBeer
• Open-source
https://github.com/scottyab/rootbeer/
https://play.google.com/store/apps/details?id=com.scottyab.rootbeer.sample
Root detection?
Having ultimate control
you can always hide from
detectors.
Detection checks for
popular rooting ways
http://simpsons.wikia.com/wiki/The_Itchy_%26_Scratchy_Show
SafetyNet root detection
private static final String[] a = {
"/system/bin/su",
"/system/xbin/su",
"/system/bin/.su",
"/system/xbin/.su" };
Integrity checks, binary protections...
Code obfuscation
Install source, signing keys
Tamper, debug detection
Use keystore
Notifications, reporting
Wipe on compromise
https://www.flickr.com/photos/carolynwill/1118743053
Backend - fraud management
Detect duplicated card use not
enough
Device scoring - os version, patch
level, bootloader unlock, installed soft
Malware handling
Behavioral analysis
https://www.flickr.com/photos/widnr/6545526341/
Future?
Devices will be more resilient, TPM?
More widespread mobile payments
= more attention of fraudsters.
Hope for the best, but prepare -
and verify - for the worst!
„with great power comes
great responsibility”
http://www.techiestate.com/spiderman-android-game/
http://www.wallpaperup.com/52270/Wolves_flock_sheep_shepherd_nature_field_sky_rocks_situation_humor_wolf_people_men_males_landscapes_sky_mountains.html
Afterparty!
http://fanaru.com/shaun-the-sheep-movie/image/90293/party-wallpaper/
MORE THAN
SECURITY
TESTING
Thank you! Questions?
Slawomir.Jasek@securing.pl slawekja

More Related Content

Similar to Hacking Android HCE Contactless Payments

ASFWS 2013 Rump Session - Abusing Twitter API One year later… Nicolas Seriot
ASFWS 2013 Rump Session - Abusing Twitter API One year later… Nicolas SeriotASFWS 2013 Rump Session - Abusing Twitter API One year later… Nicolas Seriot
ASFWS 2013 Rump Session - Abusing Twitter API One year later… Nicolas SeriotCyber Security Alliance
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityVikram Sareen
 
Project Part A & B 10.15.14
Project Part A & B 10.15.14Project Part A & B 10.15.14
Project Part A & B 10.15.14haney888
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great againEric Larcheveque
 
Crypto wallet app - Google Docs.pdf
Crypto wallet app - Google Docs.pdfCrypto wallet app - Google Docs.pdf
Crypto wallet app - Google Docs.pdfharikacheluru
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Denis Gorchakov
 
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tDefcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tPriyanka Aash
 
The Future of Progressive Web Apps - View Source conference, Berlin 2016
The Future of Progressive Web Apps - View Source conference, Berlin 2016The Future of Progressive Web Apps - View Source conference, Berlin 2016
The Future of Progressive Web Apps - View Source conference, Berlin 2016Robert Nyman
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of SaleTripwire
 
Creating Responsive Experiences
Creating Responsive ExperiencesCreating Responsive Experiences
Creating Responsive ExperiencesTim Kadlec
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingYiannis Hatzopoulos
 
Droidcon Paris: The new Android SDK
Droidcon Paris: The new Android SDKDroidcon Paris: The new Android SDK
Droidcon Paris: The new Android SDKPayPal
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coinNaga Dinesh
 

Similar to Hacking Android HCE Contactless Payments (20)

ASFWS 2013 Rump Session - Abusing Twitter API One year later… Nicolas Seriot
ASFWS 2013 Rump Session - Abusing Twitter API One year later… Nicolas SeriotASFWS 2013 Rump Session - Abusing Twitter API One year later… Nicolas Seriot
ASFWS 2013 Rump Session - Abusing Twitter API One year later… Nicolas Seriot
 
Esquema de pasos de ejecución IdM
Esquema de pasos de ejecución IdMEsquema de pasos de ejecución IdM
Esquema de pasos de ejecución IdM
 
E banking security
E banking securityE banking security
E banking security
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identity
 
Project Part A & B 10.15.14
Project Part A & B 10.15.14Project Part A & B 10.15.14
Project Part A & B 10.15.14
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
Crypto wallet app - Google Docs.pdf
Crypto wallet app - Google Docs.pdfCrypto wallet app - Google Docs.pdf
Crypto wallet app - Google Docs.pdf
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
 
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tDefcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
 
Cto eng
Cto engCto eng
Cto eng
 
The Future of Progressive Web Apps - View Source conference, Berlin 2016
The Future of Progressive Web Apps - View Source conference, Berlin 2016The Future of Progressive Web Apps - View Source conference, Berlin 2016
The Future of Progressive Web Apps - View Source conference, Berlin 2016
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
Using the GSMA OneAPI Gateway
Using the GSMA OneAPI GatewayUsing the GSMA OneAPI Gateway
Using the GSMA OneAPI Gateway
 
How to use shodan more powerful
How to use shodan more powerful How to use shodan more powerful
How to use shodan more powerful
 
Cryptocurrencies
CryptocurrenciesCryptocurrencies
Cryptocurrencies
 
Creating Responsive Experiences
Creating Responsive ExperiencesCreating Responsive Experiences
Creating Responsive Experiences
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
Droidcon Paris: The new Android SDK
Droidcon Paris: The new Android SDKDroidcon Paris: The new Android SDK
Droidcon Paris: The new Android SDK
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Hacking Android HCE Contactless Payments