A custom exploits can be created by embedding relatively malicious payloads in to an Android's executable. APK files. And then signing them in order to make them trust worthy so that targeted systems will consider it as from trusted or original source. Hence, an application will be successful to be executed on target side and simultaneously it will be providing a permanent backdoor to an attacker's system.
Starts at Saturday December 10 2016, 11:00 AM. The sessions runs for 15 minutes.