📡 – Telegram
📡
535 subscribers
68 photos
10 videos
26 files
72 links
Download Telegram
👍2
XML Security in Java
Java XML security issues and how to address them

• Parsing XML in Java
• XML-related attacks
• Exponential entity expansion
• XML External Entity Injection
• Researching security features
• Are people parsing XML securely in practice?
• Conclusion

blog:
https://semgrep.dev/blog/2022/xml-security-in-java/

📡
@hackLabel
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
reconFTW automates the entire process of reconnaissance for you. It outperforms the work of subdomain enumeration along with various vulnerability checks and obtaining maximum information about your target.

reconFTW uses a lot of techniques (passive, bruteforce, permutations, certificate transparency, source code scraping, analytics, DNS records...) for subdomain enumeration which helps you to get the maximum and the most interesting subdomains so that you be ahead of the competition.

It also performs various vulnerability checks like XSS, Open Redirects, SSRF, CRLF, LFI, SQLi, SSL tests, SSTI, DNS zone transfers, and much more. Along with these, it performs OSINT techniques, directory fuzzing, dorking, ports scanning, screenshots, nuclei scan on your target.

github
:
https://github.com/six2dez/reconftw

📡
@hackLabel
2👍1
An In-Depth Guide to Mobile Device Forensics.pdf
20.5 MB
An In-Depth Guide to Mobile Device Forensics

GSM . LTE . 5G . IMSI Catchers . SIM Cards . Jammers . iPhone Processor . ADB . Operating System Details . F2FS .
Oxygen Forensics . iCloud . JTAG . SQLite Forensic . Cell Tower . Steganography . Cryptographic Hash . Software Tracking . Smart Televisions
...

📡
@hackLabel
👍3
This media is not supported in your browser
VIEW IN TELEGRAM
• Using silent SMS to localize LTE users

• Route to RCE - Dissecting a cheap WiFi repeater

• MojoBox - yet another not so smartlock

projects:
https://mandomat.github.io/

📡
t.me/HackLabel
Mobile Espionage in the Wild: Pegasus and Nation-State Level Attacks

This briefing will take an in-depth look at the technical capabilities of mobile attacks that are being leveraged against real targets for the purpose of espionage. We will focus on Pegasus, a lawful intercept product, and the features and exploit chain it used. We will describe how we discovered and tracked the developer’s infrastructure prior to the attack, and how we later caught a sample of the elusive malcode being used against a prominent human rights defender.

youtube:
https://www.youtube.com/watch?v=Y6e_ctKqSqM&list=TLPQMDExMTIwMjPFzT6vDSW5Ng&index=2

📡
t.me/HackLabel
👍1
GSM Sensor
Passive detection of mobile phone users


Book

📡 t.me/HackLabel
👍1
Android Security & Reverse Engineering YouTube Curriculum

https://github.com/actuator/Android-Security-Exploits-YouTube-Curriculum

📡 t.me/HackLabel
👍3
Fake Airplane Mode: A mobile tampering technique to maintain connectivity

Blog:
https://www.jamf.com/blog/fake-airplane-mode-a-mobile-tampering-technique-to-maintain-connectivity/

📡 t.me/HackLabel
1👍1
VULNERABILITY WITHIN THE UNISOC BASEBAND OPENS MOBILE PHONES COMMUNICATIONS TO REMOTE HACKER ATTACKS

https://research.checkpoint.com/2022/vulnerability-within-the-unisoc-baseband/

📡 t.me/HackLabel
The Android Malware Handbook (2023).pdf
49.8 MB
The Android Malware Handbook
Detection and Analysis by Human
and Machine


Github: https://github.com/android-malware-ml-book/book-content

📡 t.me/HackLabel
❤‍🔥1🎅1