1 00:00:00,150 --> 00:00:01,470 All right, so welcome back, everyone. 2 00:00:01,500 --> 00:00:06,870 This is a mission, this session is about learning vulnerability even more. 3 00:00:07,350 --> 00:00:15,480 OK, so we have just learned about what is one ability to make you understand even more in a more realistic 4 00:00:15,480 --> 00:00:15,820 way. 5 00:00:16,110 --> 00:00:23,880 I'll take I'll be taking in real world case and this case, what are we going to do is we'll take an 6 00:00:23,880 --> 00:00:29,240 example of an app, which is let's meet the OK. 7 00:00:29,610 --> 00:00:36,540 And let's imagine you work for a company who developed applications, who develop app mobile apps, 8 00:00:36,540 --> 00:00:37,130 basically. 9 00:00:37,620 --> 00:00:42,680 So the company has developed an app which is which is a professional. 10 00:00:42,960 --> 00:00:47,740 Let's meet up to connect among people and multiple people. 11 00:00:48,960 --> 00:00:51,960 This is developed for Android and iPhone both. 12 00:00:52,710 --> 00:00:55,020 So it has got some certain features. 13 00:00:55,020 --> 00:01:02,520 The features are it's easy and it's easy for the easy and quick online meeting, screen sharing presentation 14 00:01:02,520 --> 00:01:02,960 and more. 15 00:01:03,360 --> 00:01:04,430 Now, this is pretty good. 16 00:01:04,860 --> 00:01:14,490 People like the outcome of those app as it's been widely used even because of the because of the current 17 00:01:14,490 --> 00:01:15,570 economic situation. 18 00:01:15,600 --> 00:01:20,490 There are many people making use of this app and popular among businesses. 19 00:01:20,790 --> 00:01:23,190 Everybody started paying for this app. 20 00:01:23,190 --> 00:01:25,050 Everybody started using it. 21 00:01:25,680 --> 00:01:30,190 And this has this has got a huge value as well. 22 00:01:30,210 --> 00:01:33,020 The company made a whole lot of dollars as well. 23 00:01:33,600 --> 00:01:40,170 So something happened all of a sudden because it has been used by many folks. 24 00:01:40,470 --> 00:01:46,500 Someone hacked it, someone really, really sorry about this. 25 00:01:47,160 --> 00:01:49,830 This, but a mistake for sure. 26 00:01:50,610 --> 00:01:52,470 But someone really hacked it. 27 00:01:53,370 --> 00:01:58,850 Someone hacked the application when I said someone had it, let's get an idea. 28 00:01:59,040 --> 00:02:08,190 It means that somebody got the somebody might have got the unsolicited meeting in white or maybe someone 29 00:02:08,190 --> 00:02:12,570 can access to the system without even sending the request. 30 00:02:12,960 --> 00:02:20,580 Or maybe anybody can remotely compromised your mobile app just by downloading the same app itself. 31 00:02:20,580 --> 00:02:20,850 Right. 32 00:02:20,850 --> 00:02:23,010 Without even knowing your mobile information. 33 00:02:23,010 --> 00:02:24,030 You're reading it and. 34 00:02:24,030 --> 00:02:24,860 All right. 35 00:02:25,260 --> 00:02:28,970 So that's what I'm referring to when I say it's been hacked. 36 00:02:29,880 --> 00:02:32,880 So who hacked it? 37 00:02:33,300 --> 00:02:40,710 So what happened is there are many security researcher working for many security firms right now. 38 00:02:41,250 --> 00:02:47,520 These security phones could be, you know, institution or maybe these could be freelancers or professionals 39 00:02:47,520 --> 00:02:52,390 or research or independent researchers as they have found this one liability. 40 00:02:52,410 --> 00:02:59,490 And they reported too many are do on the details as well, which I mentioned you mentioned in the earlier 41 00:02:59,490 --> 00:03:01,500 site as well to nest as well. 42 00:03:01,500 --> 00:03:10,080 And this has been taken as a serious one to do because there are many, many users who are barely making 43 00:03:10,080 --> 00:03:14,250 use of it and because this can remotely exploit it. 44 00:03:14,340 --> 00:03:20,700 So the security researchers have mentioned the detail about this app and how this get compromised. 45 00:03:21,120 --> 00:03:27,060 The security and knowledge basically submitted this detail by seeing the bug has been found within the 46 00:03:27,060 --> 00:03:31,710 app, can be compromised with actually that remote code execution. 47 00:03:31,710 --> 00:03:38,040 That means anybody can remotely execute the code on your mobile phone on to this application. 48 00:03:38,340 --> 00:03:39,820 And that's really dangerous. 49 00:03:40,290 --> 00:03:44,540 So this is what I refer to as a vulnerability on the system. 50 00:03:44,640 --> 00:03:46,370 I hope you got the idea right. 51 00:03:46,740 --> 00:03:48,870 So this is how it started. 52 00:03:48,910 --> 00:03:52,770 But now this never end here, right? 53 00:03:53,040 --> 00:04:00,560 Because if if the company if everyone get the idea about, OK, this has been hacked and somebody report 54 00:04:00,570 --> 00:04:06,630 the research or even reports that, OK, this is why it got hacked and this is why this this is what 55 00:04:06,630 --> 00:04:08,040 the situation happened, right. 56 00:04:08,460 --> 00:04:13,940 Because there's a strong there's a critical vulnerability with the system, with the application. 57 00:04:13,950 --> 00:04:17,900 So now it's the job of the application owner. 58 00:04:17,910 --> 00:04:21,420 Let's meet the team itself to fix this vulnerability. 59 00:04:22,770 --> 00:04:26,790 And then only the trust of the customer can be reteam. 60 00:04:27,660 --> 00:04:31,680 Then only the customer will not think twice before downloading. 61 00:04:32,010 --> 00:04:33,500 Let's meet up capital. 62 00:04:33,930 --> 00:04:36,810 So that's what the liberty is all about. 63 00:04:36,810 --> 00:04:39,150 That's really happened in the real world situation. 64 00:04:39,480 --> 00:04:39,890 All right. 65 00:04:40,110 --> 00:04:42,900 I hope you got the sense we'll get you in the next session. 66 00:04:43,200 --> 00:04:43,650 Thank you.