Rajanish Pathak

I (@h4ckologic) am a cybersecurity researcher passionate about uncovering and addressing critical vulnerabilities in complex technology implementations. My work includes identifying and reporting issues to top tech companies like Apple, Google , Microsoft and many others, some of my CVES identified are Apple (CVE-2021-31001), PhantomJS (CVE-2019-17221), and NPM html-pdf (CVE-2019-15138). I’ve had the privilege of sharing my research at leading conferences, including NoNameCon, Ekoparty, and Hacktivity (2020); Hack in the Box and Romhack (2023); and HITB Bangkok and BSides Ahmedabad (2024). With a focus on practical solutions and deep technical insights, I’m dedicated to advancing security practices and contributing to the global infosec community.


Session

10-24
08:00
30min
Breaking Android IPC: A Deep Dive into AIDL Fuzzing
Rajanish Pathak

In this talk, we’ll deep dive inro fuzzing Android’s IPC mechanisms, focusing on the AIDL fuzzing in particular. We’ll dive into techniques for fuzzing AIDL interfaces to uncover vulnerabilities, discuss tools and frameworks, and highlight security issues we identified using this method.

topic: hack.lu
Europe