VULNERABILITY WITHIN THE UNISOC BASEBAND OPENS MOBILE PHONES COMMUNICATIONS TO REMOTE HACKER ATTACKS
https://research.checkpoint.com/2022/vulnerability-within-the-unisoc-baseband/
https://research.checkpoint.com/2022/vulnerability-within-the-unisoc-baseband/
📡 t.me/HackLabel
The Android Malware Handbook (2023).pdf
49.8 MB
The Android Malware Handbook
Detection and Analysis by Human
and Machine
Github: https://github.com/android-malware-ml-book/book-content
Detection and Analysis by Human
and Machine
Github: https://github.com/android-malware-ml-book/book-content
📡 t.me/HackLabel
❤🔥1🎅1
SIM Cloning tool
How to use: https://support.mobiledit.com/portal/en/kb/articles/sim-clone
Download
How to use: https://support.mobiledit.com/portal/en/kb/articles/sim-clone
Download
📡 t.me/HackLabel
❤2✍1👍1
Media is too big
VIEW IN TELEGRAM
How do SIM Cards work? - SIMtrace
In this video we use SIMtrace to intercept the communication between the phone and SIM card to understand how that works. This is part 1 in a series introducing mobile security.
youtube: https://www.youtube.com/watch?v=iJFnYBJJiuQ
In this video we use SIMtrace to intercept the communication between the phone and SIM card to understand how that works. This is part 1 in a series introducing mobile security.
youtube: https://www.youtube.com/watch?v=iJFnYBJJiuQ
📡 t.me/HackLabel
❤2👍1
YouTube
SIM Jacking - Security Now 732
Protect Yourself from SIM Jacking
This Week's Stories
• SIMjacker allows attackers to hijack any phone just by sending it an SMS message.
• Here comes iOS "Lucky" 13!
• Chrome follows Mozilla to DoH with a twist.
• Want to enable DoH in Chrome right now?…
This Week's Stories
• SIMjacker allows attackers to hijack any phone just by sending it an SMS message.
• Here comes iOS "Lucky" 13!
• Chrome follows Mozilla to DoH with a twist.
• Want to enable DoH in Chrome right now?…
SIM Jacking - Security Now 732
• SIMjacker allows attackers to hijack any phone just by sending it an SMS message.
• Here comes iOS "Lucky" 13!
• Chrome follows Mozilla to DoH with a twist.
• Want to enable DoH in Chrome right now? You can, right now, if you wish.
• Chrome stops showing Extended Validation certs in the URL bar.
• Mozilla launches 'Firefox Private Network' VPN service as a browser extension.
• Windows Patch Tuesday redux
• Chrome Remote Desktop
• EXIM eMail servers are in trouble again.
youtube: https://www.youtube.com/watch?v=aJsNnWUX8ng
• SIMjacker allows attackers to hijack any phone just by sending it an SMS message.
• Here comes iOS "Lucky" 13!
• Chrome follows Mozilla to DoH with a twist.
• Want to enable DoH in Chrome right now? You can, right now, if you wish.
• Chrome stops showing Extended Validation certs in the URL bar.
• Mozilla launches 'Firefox Private Network' VPN service as a browser extension.
• Windows Patch Tuesday redux
• Chrome Remote Desktop
• EXIM eMail servers are in trouble again.
youtube: https://www.youtube.com/watch?v=aJsNnWUX8ng
📡 t.me/HackLabel
❤3👍1
Python Parser to Recover Deleted SQLite Database Data
Soooo.... last week I was listening to the Forenisc Lunch and the topic of parsing deleted records from SQLite databases came up. These Forensic Lunches are every Friday and cover a wide range of topics relevant to the Forensics Community and are hosted by David Cowen. I highly recommend participating in one if you get the chance. It's actually at 10am my time, so it's more like a Forensic Doughnut for me.
blog
Soooo.... last week I was listening to the Forenisc Lunch and the topic of parsing deleted records from SQLite databases came up. These Forensic Lunches are every Friday and cover a wide range of topics relevant to the Forensics Community and are hosted by David Cowen. I highly recommend participating in one if you get the chance. It's actually at 10am my time, so it's more like a Forensic Doughnut for me.
blog
📡 t.me/HackLabel
👍2
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create denoscriptions of malware families (or whatever you want to describe) based on textual or binary patterns.YARA’s documentation
example:
rule android_banker
{
meta:
denoscription = "Detects Android Banker"
author = "Oleg Skulkin"
strings:
$s1 = "com.example.horsenjnj" ascii wide
$s2 = "res/xml/shit.xml" ascii wide
condition:
all of them
}
📡 t.me/HackLabel
• Joe Sandbox is a malware analysis service that allows users to submit suspicious files for analysis. This service can help you identify new malware and prevent it from causing harm.
• Using Joe Sandbox, suspicious files are automatically analyzed and the results are presented to you. This service is capable of detecting various types of malware, including spyware, trojans, viruses, bots, and more.
• With Joe Sandbox, you can easily identify suspicious files and delete them if necessary. This service allows you to identify new malware and prevent it from causing harm.
• Joe Sandbox features include accurate analysis, malware detection, behavioral detection, vulnerability detection, comprehensive reporting, and more. Using this service, you can easily analyze suspicious files and prevent them from causing harm.
Link: https://www.joesandbox.com/
• Using Joe Sandbox, suspicious files are automatically analyzed and the results are presented to you. This service is capable of detecting various types of malware, including spyware, trojans, viruses, bots, and more.
• With Joe Sandbox, you can easily identify suspicious files and delete them if necessary. This service allows you to identify new malware and prevent it from causing harm.
• Joe Sandbox features include accurate analysis, malware detection, behavioral detection, vulnerability detection, comprehensive reporting, and more. Using this service, you can easily analyze suspicious files and prevent them from causing harm.
Link: https://www.joesandbox.com/
📡 t.me/HackLabel
👍2