Android Security & Malware – Telegram
Android Security & Malware
43.3K subscribers
127 photos
19 videos
7 files
2.69K links
Mobile cybersecurity channel
Links: https://linktr.ee/mobilehacker
Contact: mobilehackerofficial@gmail.com
Download Telegram
Using AT commands (not ADB commands) to extract sensitive Android device info via USB cable

AT commands could be used for Android forensics to extract filesystem images and for some cases even unlocking smartphone
https://www.instagram.com/p/CFtkDgkgHTj/
Mobile forensic analysis in action using Andriller
Andriller dumps all accessible data from device, but first you need to enabled ADB debugging. In my case, I performed it on PIN locked, but rooted Samsung S5.
https://www.instagram.com/p/CGEmcz7gv3t/
BTW, Andriller was a commercial toolkit until December 2019, however its author made it free and open-source, so now you can download full version without paying.
Download: https://github.com/den4uk/andriller
Vulnerability in JioChat for Android
Caller can cause callee device to send audio without user interaction
https://bugs.chromium.org/p/project-zero/issues/detail?id=2059
Bruteforcing PIN lockscreen using Android as USB HID device

ADB and root are not required to perform this brutforce method!

Requirements:
-Custom compiled Kernel with support for /dev/hidg*
-OTG cable
-Termux
-noscript with commands
https://www.instagram.com/p/CGRmHwog5oy/
Tutorial:
https://github.com/pelya/android-keyboard-gadget
Diving Into mobile APT group DONOT's Rabbit Hole
https://community.riskiq.com/article/6f60db72