The Turkish Government Masqueraded Site Distributing Android RAT
https://blog.cyble.com/2023/07/10/the-turkish-government-masqueraded-site-distributing-android-rat/
https://blog.cyble.com/2023/07/10/the-turkish-government-masqueraded-site-distributing-android-rat/
Cyble
Turkish Gov Site Masquerade Distributes Android RAT
CRIL analyzes the phishing campaign masquerading Turkish Government to distribute Android RAT with VNC and Keylogging feature
👍16❤1🥰1
How to install Kali NetHunter on rootless Android via Termux and how to set it up as a portable Kali Linux workstation
Blog: https://www.mobile-hacker.com/2023/07/11/nethunter-hacker-i-installation-of-rootless-kali-nethunter/
Video tutorial: https://youtu.be/fqaSEbaYkJQ
Blog: https://www.mobile-hacker.com/2023/07/11/nethunter-hacker-i-installation-of-rootless-kali-nethunter/
Video tutorial: https://youtu.be/fqaSEbaYkJQ
Mobile Hacker
NetHunter Hacker I: Installation of rootless Kali NetHunter Mobile Hacker
If you seek for Kali desktop experience on your smartphone without risks of voiding warranty by rooting it and a chance of sticking in bootloop or even bricking it, this tutorial is for you. If you rather prefer video tutorials, feel free to check installation…
👍17❤5
Letscall – new sophisticated Vishing toolset consists of three malicious stages
https://www.threatfabric.com/blogs/letscall-new-sophisticated-vishing-toolset
https://www.threatfabric.com/blogs/letscall-new-sophisticated-vishing-toolset
ThreatFabric
Letscall – new sophisticated Vishing toolset
ThreatFabric discovered new Vishing campaign targeting individuals from South Korea
👍14❤1🤔1
Finding the Entrypoint of iOS Apps in Ghidra
In video tutorial we extract the components of an iOS application and learn how to find the entrypoint using Ghidra to start reverse engineering
https://youtu.be/mLDsIMXafP4
In video tutorial we extract the components of an iOS application and learn how to find the entrypoint using Ghidra to start reverse engineering
https://youtu.be/mLDsIMXafP4
YouTube
Finding the Entrypoint of iOS Apps in Ghidra
In this video we extract the components of an iOS application and learn how to find the entrypoint in Ghidra to start reverse engineering.
---
Timestamps:
00:00 Intro
00:33 Grabbing Sample
01:41 Don't Dump the whole thing!
02:29 Info.plist
03:40 Mach-O…
---
Timestamps:
00:00 Intro
00:33 Grabbing Sample
01:41 Don't Dump the whole thing!
02:29 Info.plist
03:40 Mach-O…
👍20
Bypassing advance root detections using Frida
Techniques learned from video:
-presence of SU binary
-SELinux policies
-mountinfo
-attr/prev
-looking for SU bin paths using Supervisor calls
Video: https://youtu.be/7KqPwxlA-00
Scripts and POCs: https://github.com/fatalSec/in-app-protections
Techniques learned from video:
-presence of SU binary
-SELinux policies
-mountinfo
-attr/prev
-looking for SU bin paths using Supervisor calls
Video: https://youtu.be/7KqPwxlA-00
Scripts and POCs: https://github.com/fatalSec/in-app-protections
YouTube
Bypassing advance root detections using Frida
#mobilesecurity #rootdetection #android #mobilepentesting #reverseengineering #radare2 #arm64
Hello everyone, hope you all are doing good.
In this video, we are going to learn various different techniques used by app developers to protect their app from…
Hello everyone, hope you all are doing good.
In this video, we are going to learn various different techniques used by app developers to protect their app from…
🔥17👍12❤3
iOS Forensic Toolkit tips & tricks
https://blog.elcomsoft.com/2023/07/ios-forensic-toolkit-tips-tricks/
https://blog.elcomsoft.com/2023/07/ios-forensic-toolkit-tips-tricks/
ElcomSoft blog
iOS Forensic Toolkit Tips & Tricks
For forensic experts dealing with mobile devices, having a reliable and efficient forensic solution is crucial. Elcomsoft iOS Forensic Toolkit is an all-in-one software that aids in extracting data from iOS devices, yet it is still far away from being a one…
👍14❤2
How to root OnePlus 7 Pro and install Kali NetHunter with custom kernel
[blog] https://www.mobile-hacker.com/2023/07/18/how-to-install-kali-nethunter-on-rooted-oneplus-7-pro/
[video] https://youtu.be/nkiy5iwa6Vs
[blog] https://www.mobile-hacker.com/2023/07/18/how-to-install-kali-nethunter-on-rooted-oneplus-7-pro/
[video] https://youtu.be/nkiy5iwa6Vs
Mobile Hacker
NetHunter Hacker II: How to install Kali NetHunter on rooted OnePlus 7 Pro Mobile Hacker
In this post we will go through installation of NetHunter with full kernel support on OnePlus 7 Pro device. The main benefit is to have drivers support for internal or external devices such as Wi-fi, Bluetooth, HID, BadUSB and SDR gadgets. Our goal will be…
👍18❤1
Analysis of WyrmSpy and DragonEgg Android spyware attributed to Chinese Espionage Group APT41
https://www.lookout.com/threat-intelligence/article/wyrmspy-dragonegg-surveillanceware-apt41
https://www.lookout.com/threat-intelligence/article/wyrmspy-dragonegg-surveillanceware-apt41
Lookout
WyrmSpy and DragonEgg: Lookout Attributes Android Spyware to China’s APT41 | Threat Intel
Lookout researchers discover advanced Android surveillanceware tied to Chinese espionage group APT41 known to target a wide range of public and private sector organizations.
👍12🤔2❤1
Advanced Frida Usage Part 3 – Inspecting iOS XPC Calls
XPC is a type of IPC (InterProcess Communication) used on *OS
https://8ksec.io/advanced-frida-usage-part-3-inspecting-ios-xpc-calls/
XPC is a type of IPC (InterProcess Communication) used on *OS
https://8ksec.io/advanced-frida-usage-part-3-inspecting-ios-xpc-calls/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 3 – Inspecting XPC Calls - 8kSec
In Part 3, Explore inner workings of XPC communication between processes on iOS, intercept and modify XPC messages for advanced insights. Read now!
🔥7👍3
How to reverse engineer #Xamarin iOS and Android apps
Xamarin is open-source platform that allows to create cross platform apps for iOS, Android, and Windows using C#
https://www.appknox.com/security/xamarin-reverse-engineering-a-guide-for-penetration-testers
Xamarin is open-source platform that allows to create cross platform apps for iOS, Android, and Windows using C#
https://www.appknox.com/security/xamarin-reverse-engineering-a-guide-for-penetration-testers
Appknox
Xamarin Reverse Engineering: A Guide for Penetration Testers
Learn the essentials of reverse engineering Xamarin apps and why penetration testing is essential to keep your mobile applications secure
👍19
Android SpyNote attacks electric and water public utility users in Japan
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-spynote-attacks-electric-and-water-public-utility-users-in-japan/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-spynote-attacks-electric-and-water-public-utility-users-in-japan/
McAfee Blog
Android SpyNote attacks electric and water public utility users in Japan | McAfee Blog
Authored by Yukihiro Okutomi McAfee's Mobile team observed a smishing campaign against Japanese Android users posing as a power and water infrastructure
👍11👏1
Bypass Instagram and Threads SSL pinning on Android
You can download already patched APKs for none-rooted devices, patch APK using Python noscript yourself, or download Frida bypass noscript for rooted Android
https://github.com/Eltion/Instagram-SSL-Pinning-Bypass
You can download already patched APKs for none-rooted devices, patch APK using Python noscript yourself, or download Frida bypass noscript for rooted Android
https://github.com/Eltion/Instagram-SSL-Pinning-Bypass
GitHub
GitHub - Eltion/Instagram-SSL-Pinning-Bypass: Bypass Instagram SSL pinning on Android devices.
Bypass Instagram SSL pinning on Android devices. Contribute to Eltion/Instagram-SSL-Pinning-Bypass development by creating an account on GitHub.
👍16❤6👏1
Reverse Engineering Android game Coin Hunt World and its communication protocol to cheat the app. Bug reported and fixed
https://research.nccgroup.com/2023/05/31/reverse-engineering-coin-hunt-worlds-binary-protocol/
https://research.nccgroup.com/2023/05/31/reverse-engineering-coin-hunt-worlds-binary-protocol/
👍7❤1
In details slides explaining exploitation of binder kernel use-after-free (UAF) vulnerability in the Android kernel (CVE-2022-20421) to achieves full kernel R/W
Affected devices: devices running Kernel version 5.4.x and 5.10.x
Slides: https://0xkol.github.io/assets/files/OffensiveCon23_Racing_Against_the_Lock__Exploiting_Spinlock_UAF_in_the_Android_Kernel.pdf
Research: https://0xkol.github.io/assets/files/Racing_Against_the_Lock__Exploiting_Spinlock_UAF_in_the_Android_Kernel.pdf
PoC: https://github.com/0xkol/badspin
Affected devices: devices running Kernel version 5.4.x and 5.10.x
Slides: https://0xkol.github.io/assets/files/OffensiveCon23_Racing_Against_the_Lock__Exploiting_Spinlock_UAF_in_the_Android_Kernel.pdf
Research: https://0xkol.github.io/assets/files/Racing_Against_the_Lock__Exploiting_Spinlock_UAF_in_the_Android_Kernel.pdf
PoC: https://github.com/0xkol/badspin
🔥9👍3
Tutorial on how to build NetHunter image for OnePlus 7 Pro
Kali NetHunter supports 89 Android models, however, offers to download up to 32 precompiled images.
Because of that, for 57 devices, users must manually build an installation image
https://www.mobile-hacker.com/2023/07/24/nethunter-hacker-iii-how-to-build-kali-nethunter-for-oneplus-7-pro/
Kali NetHunter supports 89 Android models, however, offers to download up to 32 precompiled images.
Because of that, for 57 devices, users must manually build an installation image
https://www.mobile-hacker.com/2023/07/24/nethunter-hacker-iii-how-to-build-kali-nethunter-for-oneplus-7-pro/
Mobile Hacker
NetHunter Hacker III: How to build Kali NetHunter for OnePlus 7 Pro Mobile Hacker
In previous posts we went through installation process of rootless and rooted NetHunter on OnePlus 7 device, using already pre-compiled image from Kali website. Since the OnePlus 7 is a preferred high-end device by NetHunter, its image is already compiled…
👍13❤6😱4🤔1
Writing your first Frida noscript for Android
https://labs.cognisys.group/posts/Writing-your-first-Frida-noscript-for-Android/
https://labs.cognisys.group/posts/Writing-your-first-Frida-noscript-for-Android/
Cognisys Group Labs
Writing your first Frida noscript for Android
Overview
👍9🙏1
Recent leaked source code of Android banking Trojan Hook
Leak contains build panel & APK source code.
Hook can VNC into victim device and using accessibility services automatically extract seed phrases from cryptocurrency wallets.
https://github.com/0xperator/hookbot_source
Leak contains build panel & APK source code.
Hook can VNC into victim device and using accessibility services automatically extract seed phrases from cryptocurrency wallets.
https://github.com/0xperator/hookbot_source
GitHub
GitHub - 0xperator/hookbot_source: This repository contains a few leaked files of HookBot.
This repository contains a few leaked files of HookBot. - 0xperator/hookbot_source
👍16❤1👎1
A guide that provides practical knowledge for understanding Android Smali code
Includes video demo and APK challenge
https://www.linkedin.com/pulse/android-static-analysis-fundamentals-smali-code-introduction
Includes video demo and APK challenge
https://www.linkedin.com/pulse/android-static-analysis-fundamentals-smali-code-introduction
Linkedin
Android Static Analysis Fundamentals: Smali Code Introduction and Modifications
TL;DR: Discover the power of Smali code, a vital skill for Android app analysis and reverse engineering apps. Unveil an app’s inner workings and spot security vulnerabilities with ease.
👍13❤2🔥1
Investigating SMS phishing text messages from scratch
https://blog.bushidotoken.net/2023/07/investigating-sms-phishing-text.html
https://blog.bushidotoken.net/2023/07/investigating-sms-phishing-text.html
blog.bushidotoken.net
Investigating SMS phishing text messages from scratch
CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security
👍10❤2🔥2
Mobile App Pentesting: AndroGOAT
Walk-through popular vulnerabilities such as Unprotected Android Components, Insecure data storage, SQL injection, XSS, file access via WebView, keyboard leaks, insecure logging, etc. https://infosecwriteups.com/mobile-pentesting-androgoat-assessment-walkthrough-1a63a7edc677
Walk-through popular vulnerabilities such as Unprotected Android Components, Insecure data storage, SQL injection, XSS, file access via WebView, keyboard leaks, insecure logging, etc. https://infosecwriteups.com/mobile-pentesting-androgoat-assessment-walkthrough-1a63a7edc677
Medium
Mobile App Pentesting: AndroGOAT Assessment Walkthrough
Have you ever wondered about the vulnerabilities hidden beneath the surface of your favorite mobile apps? I certainly did, which is why I…
👍18❤1