Android Banker Deep Dive (Part 1)
Fully reverse engineering of a Android Banker trojan from start to finish
https://youtu.be/Vs9Z3NDnVT8
Fully reverse engineering of a Android Banker trojan from start to finish
https://youtu.be/Vs9Z3NDnVT8
YouTube
Android Banker Deep Dive (Part 1)
In this [RE]laxing new series, I fully reverse a difficult Android Banker trojan from start to finish.
These extensive "Deep Dive" segments concentrate on dissecting malware specimens and delving into the individual approaches employed to fully reverse them.…
These extensive "Deep Dive" segments concentrate on dissecting malware specimens and delving into the individual approaches employed to fully reverse them.…
👍13🍓4👏1
Re-Exploiting Huawei Recovery With FaultyUSB
FaultyUSB: exploiting a TOCTOU race condition bug in recovery to get root on Huawei devices by emulating a malicious USB flash drive
https://labs.taszk.io/articles/post/reunzip/
FaultyUSB: exploiting a TOCTOU race condition bug in recovery to get root on Huawei devices by emulating a malicious USB flash drive
https://labs.taszk.io/articles/post/reunzip/
labs.taszk.io
[BugTales] REUnziP: Re-Exploiting Huawei Recovery With FaultyUSB
Huawei Recovery Update Zip ToC-ToU Vulnerability
🔥11👍3
[new version] OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS
https://github.com/OWASP/igoat-swift
https://github.com/OWASP/igoat-swift
GitHub
GitHub - OWASP/iGoat-Swift: OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS
OWASP iGoat (Swift) - A Damn Vulnerable Swift Application for iOS - OWASP/iGoat-Swift
👍12
Resource for Android static analysis and vulnerability assessment
Tutorials, tools, and resources for identifying and mitigating security vulnerabilities in Android applications
https://github.com/krizzsk/HackersCave4StaticAndroidSec
Tutorials, tools, and resources for identifying and mitigating security vulnerabilities in Android applications
https://github.com/krizzsk/HackersCave4StaticAndroidSec
GitHub
GitHub - krizzsk/HackersCave4StaticAndroidSec: A comprehensive resource for Android static analysis and vulnerability assessment.…
A comprehensive resource for Android static analysis and vulnerability assessment. Tutorials, tools, and resources for identifying and mitigating security vulnerabilities in Android applications. -...
👍13👎1
Awesome ADB
Probably the most detailed ADB documentation with examples I have ever seen
https://github.com/mzlogin/awesome-adb/blob/master/README.en.md
Probably the most detailed ADB documentation with examples I have ever seen
https://github.com/mzlogin/awesome-adb/blob/master/README.en.md
GitHub
awesome-adb/README.en.md at master · mzlogin/awesome-adb
ADB Usage Complete / ADB 用法大全. Contribute to mzlogin/awesome-adb development by creating an account on GitHub.
👍20🔥8❤4
Android backdoor targets journalist in South Korea through APT phishing campaign
https://interlab.or.kr/archives/2567
https://interlab.or.kr/archives/2567
interlab.or.kr
Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware
Interlab is a non-profit organization based in Seoul with mission to create resilient digital safety net for freedom of citizens, providing free digital security consultations, trainings, incident response support and research of cyber threat toward civic…
👍9❤2
FaceStealers, Fleeceware and Adware discovered on Google Play posing as AI art apps
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-rise-and-risks-of-ai-art-apps/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-rise-and-risks-of-ai-art-apps/
McAfee Blog
The Rise and Risks of AI Art Apps | McAfee Blog
Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as the “Magic Avatars”
👍15❤1
Flipper Zero Controlling Traffic Lights
https://youtu.be/TrVLmTLHgew
https://youtu.be/TrVLmTLHgew
YouTube
Flipper Zero Controlling Traffic Lights
Flipper Zero using its onboard Signal Generator and interfaced through the GPIO's with a high power Infrared LED array can imitate a 3M OptiCom transmitter. This system is known as Traffic Signal Preemption and can cause the traffic light controller to give…
👍30🔥5❤1
OyeTalk - Live Voice Chat Room app with 5M+ installs leaked private user conversations
It stored unencrypted user chats, names and IMEI numbers on a database unguarded by a password
https://cybernews.com/security/android-voice-chat-app-leaked-private-user-conversations/
It stored unencrypted user chats, names and IMEI numbers on a database unguarded by a password
https://cybernews.com/security/android-voice-chat-app-leaked-private-user-conversations/
Cybernews
Android voice chat app leaked private user conversations
A popular app for voice chats, OyeTalk, stored unencrypted user chats on a database unguarded by a password.
👍15🥰2
Vulnerabilities in NSPredicate were discovered in macOS 13.2 and iOS 16.3 (CVE-2023-23530, CVE-2023-23531)
App can achieve code execution inside of SpringBoard, a highly privileged app that can access location data, the camera and microphone, call history, photos, and other sensitive data, as well as wipe the device
https://www.trellix.com/en-us/about/newsroom/stories/research/trellix-advanced-research-center-discovers-a-new-privilege-escalation-bug-class-on-macos-and-ios.html
App can achieve code execution inside of SpringBoard, a highly privileged app that can access location data, the camera and microphone, call history, photos, and other sensitive data, as well as wipe the device
https://www.trellix.com/en-us/about/newsroom/stories/research/trellix-advanced-research-center-discovers-a-new-privilege-escalation-bug-class-on-macos-and-ios.html
Trellix
Trellix Advanced Research Center Discovers a New Privilege Escalation Bug Class on macOS and iOS
The Trellix Advanced Research Center vulnerability team has discovered a large new class of bugs that allow bypassing code signing to execute arbitrary code in the context of several platform applications, leading to escalation of privileges and sandbox escape…
👍7🔥1
Hardening Firmware Across the Android Ecosystem
https://security.googleblog.com/2023/02/hardening-firmware-across-android.html
https://security.googleblog.com/2023/02/hardening-firmware-across-android.html
Google Online Security Blog
Hardening Firmware Across the Android Ecosystem
Posted by Roger Piqueras Jover, Ivan Lozano, Sudhi Herle, and Stephan Somogyi, Android Team A modern Android powered smartphone is a comp...
👍7🔥2🥰1
Android Banker Deep Dive Analysis - Part 2
https://youtu.be/cGxQ3WIv9nI
https://youtu.be/cGxQ3WIv9nI
YouTube
Android Banker Deep Dive (Part 2)
Part 2 of our Banker Deep Dive. We continue our analysis of the JSON objects and recognize indicators of packing. We then try to use the Medusa framework to unpack.
---
In this [RE]laxing new series, I fully reverse a difficult Android Banker trojan from…
---
In this [RE]laxing new series, I fully reverse a difficult Android Banker trojan from…
👍8👏7🍓2❤1
Google vulnerability Reward Program: 2022 Year in Review
- identified and fix over 2,900 security issues
- Google paid $12 million in bug bounties
- $4.8 million rewards for Android security issues
https://security.googleblog.com/2023/02/vulnerability-reward-program-2022-year.html
- identified and fix over 2,900 security issues
- Google paid $12 million in bug bounties
- $4.8 million rewards for Android security issues
https://security.googleblog.com/2023/02/vulnerability-reward-program-2022-year.html
Google Online Security Blog
Vulnerability Reward Program: 2022 Year in Review
Posted by Sarah Jacobus, Vulnerability Rewards Team It has been another incredible year for the Vulnerability Reward Programs (VRPs) at G...
👍11🥰3😱3❤2
Forwarded from The Bug Bounty Hunter
The code that wasn’t there: Reading memory on an Android device by accident
https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/
https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/
The GitHub Blog
The code that wasn't there: Reading memory on an Android device by accident
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space…
👍16🔥8
SameSite cookie bypass on Android by redirecting to to intent-picker with PoC code ($5,000 bounty)
https://bugs.chromium.org/p/chromium/issues/detail?id=1368230
https://bugs.chromium.org/p/chromium/issues/detail?id=1368230
👍10
Mobile Threat Report by McAfee 2023
https://www.mcafee.com/content/dam/consumer/en-us/docs/reports/rp-mobile-threat-report-feb-2023.pdf
https://www.mcafee.com/content/dam/consumer/en-us/docs/reports/rp-mobile-threat-report-feb-2023.pdf
👍10
Android Meterpreter commands
(UHD quality: https://github.com/Ignitetechnologies/Mindmap/tree/main/Metasploit)
(UHD quality: https://github.com/Ignitetechnologies/Mindmap/tree/main/Metasploit)
👍27❤1
Android Malware Analysis: Malicious Australian Taxation Office app
https://n0psn0ps.github.io/2023/03/02/android-malware-analysis-series-ato.apk-part-3.1/
https://n0psn0ps.github.io/2023/03/02/android-malware-analysis-series-ato.apk-part-3.1/
n0ps
Android Malware Analysis Series - ATO.apk - Part 3.1
Permanent dark(er) theme for Poole
👍11
Online shopping Android app - SHEIN - with 100M+ installs transmitted clipboard data to remote servers
https://www.microsoft.com/en-us/security/blog/2023/03/06/protecting-android-clipboard-content-from-unintended-exposure/
https://www.microsoft.com/en-us/security/blog/2023/03/06/protecting-android-clipboard-content-from-unintended-exposure/
Microsoft News
Protecting Android clipboard content from unintended exposure
An old version of the SHEIN Android app periodically read the contents of the Android device clipboard & sent the contents to a remote server.
👍13🥴6🔥1