Forwarded from @Phantasm_Lab
The Mobile Application Hackers Handbook
🕴 @Phantasm_Lab
Mobile computing has changed the game. Your personal data is no longer just stored on your desktop in the sanctuary of your office or home. You now carry personally identifiable information, financial data, personal and corporate email, and much more in your pocket, wherever you go. The smartphone is quickly becoming ubiquitous, and with at least 40 applications installed on the average smartphone the attack surface is significant.The focus of this book is highly practical. Although we provide some background theory for you to understand the fundamentals of mobile application vulnerabilities, our primary concern is documenting the techniques you need to master to attack and exploit them. Where applicable, we include real-world examples derived from our many years of experience and from publically documented vulnerabilities.🕴 @Phantasm_Lab
Phantasm Lab English Group
🦠 @Phantasm_Lab
Rules of House
- Programming Languages
- Bug Bounty 💷 💵- Open Source & Free Software
- Exploitable tools
- sysADM
- Linux X Windows
- RED X BLUE security
https://news.1rj.ru/str/joinchat/HSfwBUe_xM6NuC5FCjKVWQ🦠 @Phantasm_Lab
First look at a simple PoC crash - Exploiting FFmpeg ft. Paul Cher
https://www.youtube.com/watch?v=drPyKgt1MMg
🦠 @Phantasm_Lab
This is the first part of exploiting ffmpeg. A huge thank you to Paul Cher for the excellent work on recording the process and sharing his research. I merely edited it together.https://www.youtube.com/watch?v=drPyKgt1MMg
🦠 @Phantasm_Lab
YouTube
First look at a simple PoC crash - Exploiting FFmpeg ft. Paul Cher
This is the first part of exploiting ffmpeg. A huge thank you to Paul Cher for the excellent work on recording the process and sharing his research. I merely edited it together.
Vulnerable Version: https://github.com/FFmpeg/FFmpeg/tree/d903b4e3ad4a81b3d…
Vulnerable Version: https://github.com/FFmpeg/FFmpeg/tree/d903b4e3ad4a81b3d…
Analysis of CVE-2016-10190 - Exploiting FFmpeg ft. Paul Cher
https://www.youtube.com/watch?v=Lpt7WIqXOgM
🦠 @Phantasm_Lab
Deeper look at CVE-2016-10190. A Heap overflow caused by a negative HTTP chunksize.https://www.youtube.com/watch?v=Lpt7WIqXOgM
🦠 @Phantasm_Lab
YouTube
Analysis of CVE-2016-10190 - Exploiting FFmpeg ft. Paul Cher
Deeper look at CVE-2016-10190. A Heap overflow caused by a negative HTTP chunksize.
Vulnerable Version: https://github.com/FFmpeg/FFmpeg/tree/d903b4e3ad4a81b3dd79f12c2f3b9cb16e511173
Paul on Twitter: https://twitter.com/__paulch
LiveOverflow Podcast: ht…
Vulnerable Version: https://github.com/FFmpeg/FFmpeg/tree/d903b4e3ad4a81b3dd79f12c2f3b9cb16e511173
Paul on Twitter: https://twitter.com/__paulch
LiveOverflow Podcast: ht…
RTMP Heap Overflow CVE-2016-10191 - Exploiting FFmpeg ft. Paul Cher
https://www.youtube.com/watch?v=hRei9xXRAGE
🦠 @Phantasm_Lab
Paul shows us another exploit for FFmpeg. The vulnerability is located in the RTMP protocol. While working with the binary format of the protocol requires a lot of work, the exploit itself is very easy.https://www.youtube.com/watch?v=hRei9xXRAGE
🦠 @Phantasm_Lab
YouTube
RTMP Heap Overflow CVE-2016-10191 - Exploiting FFmpeg ft. Paul Cher
Paul shows us another exploit for FFmpeg. The vulnerability is located in the RTMP protocol. While working with the binary format of the protocol requires a lot of work, the exploit itself is very easy.
Vulnerable Version: https://github.com/FFmpeg/FFmp…
Vulnerable Version: https://github.com/FFmpeg/FFmp…
SEC599 - Defeat Advanced Adversaries
https://drive.google.com/open?id=1f143KWI1QasJuM19qnXeQwRQshsvetFO
📟 @Phantasm_Lab
📟 @p4riza
https://drive.google.com/open?id=1f143KWI1QasJuM19qnXeQwRQshsvetFO
📟 @Phantasm_Lab
📟 @p4riza
URL Bar Spoofin g Flaw in Safari for iOS 12.3 and iOS 13 Beta | CVE-2019-8727
https://medium.com/bugbountywriteup/url-bar-spoofing-in-safari-for-ios-12-3-and-ios-13-beta-cve-2019-8727-d87490f8ee29
📬 @Phantasm_Lab
https://medium.com/bugbountywriteup/url-bar-spoofing-in-safari-for-ios-12-3-and-ios-13-beta-cve-2019-8727-d87490f8ee29
📬 @Phantasm_Lab
Medium
URL Bar Spoofing in Safari for iOS 12.3 and iOS 13 Beta | CVE-2019–8727
While working for browser-based attacks on the URL bar, I learned a way where it was still possible to spoof address bar in safari. None…
How two dead accounts allowed REMOTE CRASH of any Instagram android user
https://medium.com/bugbountywriteup/how-two-dead-users-allowed-remote-crash-of-any-instagram-android-user-8f20e88b1b59
📬 @Phantasm_Lab
https://medium.com/bugbountywriteup/how-two-dead-users-allowed-remote-crash-of-any-instagram-android-user-8f20e88b1b59
📬 @Phantasm_Lab
Medium
How two dead accounts allowed REMOTE CRASH of any Instagram android user
Facebook bug bounty remote crash bug
How I was able to bypass OTP code requirement in Razer [The story of a critical bug]
https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572
https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572
Medium
How I was able to bypass OTP code requirement in Razer [The story of a critical bug]
A story of turning an Informative bug to critical bug
