How to attack (and secure) an Android app: An introduction
Presentation: https://www.droidcon.com/2023/07/31/how-to-attack-and-secure-an-android-app-an-introduction/
CTF apk: https://github.com/badolphi/droidcon-berlin
Slides: https://github.com/badolphi/droidcon-berlin/blob/main/Presentation.pdf
Presentation: https://www.droidcon.com/2023/07/31/how-to-attack-and-secure-an-android-app-an-introduction/
CTF apk: https://github.com/badolphi/droidcon-berlin
Slides: https://github.com/badolphi/droidcon-berlin/blob/main/Presentation.pdf
droidcon
How to attack (and secure) an Android app: an introduction
Android applications can be attacked in a multitude of ways. This workshop will give an introduction to some of the most popular attacks. It will explain how the attacks work in theory, demonstrate how they can be done in practice, with which tools, and discuss…
👍13❤5
Interesting network traffic interception method. Should work for Xamarin and Dart made apps.
Smartphone (OpenVPN) -> VPN server -redirection-> BurpSuite
https://bhavukjain.com/blog/2023/02/19/capturing-requests-non-proxy-aware-application
Smartphone (OpenVPN) -> VPN server -redirection-> BurpSuite
https://bhavukjain.com/blog/2023/02/19/capturing-requests-non-proxy-aware-application
Bhavukjain
Capturing HTTP Requests from a non-proxy-aware Mobile Application | bhavukjain1
UPDATE - This post has been updated to include a stable set of NAT rules for iptables. Mobile applications are becoming increasingly…
👍11❤1⚡1
Finding backup vulnerabilities in Android apps
✅android:allowBackup="true"
https://medium.com/@vishwaraj101/finding-backup-vulnerabilities-in-android-apps-6b87330f97b3
✅android:allowBackup="true"
https://medium.com/@vishwaraj101/finding-backup-vulnerabilities-in-android-apps-6b87330f97b3
Medium
Finding backup vulnerabilities in android apps
Hi everyone this post is just an elaboration of the 10th point that I made it in my previous post which is being often missed by…
👍13❤4🤔2
Extracting User Locations by Analyzing SMS Timings
https://arxiv.org/abs/2306.07695
https://arxiv.org/abs/2306.07695
🔥12👍2
Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices
https://mrbypass.medium.com/assessing-security-risks-of-local-storage-on-non-jailbroken-ios-devices-8d303ebe0e77
https://mrbypass.medium.com/assessing-security-risks-of-local-storage-on-non-jailbroken-ios-devices-8d303ebe0e77
Medium
Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices
Hello everyone, while doing iOS application penetration testing you may have come across a situation where you don’t have the jailbroken…
🔥11👍4
Exploring Frida & Objection on Non-Jailbroken Devices without Application Patching
https://mrbypass.medium.com/unlocking-potential-exploring-frida-objection-on-non-jailbroken-devices-without-application-ed0367a84f07
https://mrbypass.medium.com/unlocking-potential-exploring-frida-objection-on-non-jailbroken-devices-without-application-ed0367a84f07
Medium
Unlocking Potential: Exploring Frida & Objection on Non-Jailbroken Devices without Application…
As we saw in the previous article Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices that how we can install the…
👍20
Invisible Adware: Unveiling Ad Fraud Targeting Korean Android Users
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/invisible-adware-unveiling-ad-fraud-targeting-korean-android-users/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/invisible-adware-unveiling-ad-fraud-targeting-korean-android-users/
McAfee Blog
Invisible Adware: Unveiling Ad Fraud Targeting Android Users | McAfee Blog
Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it's no surprise that users are becoming
👍7🔥1😁1🤔1
NetHunter Hacker VI:
How to setup HID & Rubber Ducky attacks with and without NetHunter, run PowerShell noscripts, and intercept network traffic with BadUSB MITM setup
https://www.mobile-hacker.com/2023/08/08/nethunter-hacker-vi-ultimate-guide-to-hid-attacks-using-rubber-ducky-noscripts-and-bad-usb-mitm-attack/
How to setup HID & Rubber Ducky attacks with and without NetHunter, run PowerShell noscripts, and intercept network traffic with BadUSB MITM setup
https://www.mobile-hacker.com/2023/08/08/nethunter-hacker-vi-ultimate-guide-to-hid-attacks-using-rubber-ducky-noscripts-and-bad-usb-mitm-attack/
Mobile Hacker
NetHunter Hacker VI: Ultimate guide to HID attacks using Rubber Ducky noscripts and Bad USB MITM attack Mobile Hacker
Have you ever wondered how hackers can compromise a computer with just a USB device? In this blogpost, we will explore the concept of HID attacks, which are a type of physical host attack that use a programmable device to emulate a keyboard or mouse and execute…
👍16❤1🔥1
Uncovering an Iranian mobile malware campaign
https://news.sophos.com/en-us/2023/07/27/uncovering-an-iranian-mobile-malware-campaign/
https://news.sophos.com/en-us/2023/07/27/uncovering-an-iranian-mobile-malware-campaign/
Sophos News
Uncovering an Iranian mobile malware campaign
Sophos X-Ops researchers discover a cluster of credential-harvesting apps targeting Iranian bank customers
🔥9👍5🤔1
ZygiskFrida: zygisk module injects Frida gadget in Android apps in a stealthy way
-It is not embedded into the APK itself. APK Integrity/Signature checks will pass
-Avoiding ptrace based detection
-Allows to load multiple libraries into the process
https://github.com/lico-n/ZygiskFrida
-It is not embedded into the APK itself. APK Integrity/Signature checks will pass
-Avoiding ptrace based detection
-Allows to load multiple libraries into the process
https://github.com/lico-n/ZygiskFrida
GitHub
GitHub - lico-n/ZygiskFrida: Injects frida gadget using zygisk to bypass anti-tamper checks.
Injects frida gadget using zygisk to bypass anti-tamper checks. - lico-n/ZygiskFrida
👍19❤3👏2
Popular Chinese keyboard app (Sogou Keyboard) transmits every typed key to their server (Windows, Android, iOS).
On top of that, it contains vulnerabilities in encryption that expose user keypresses to network eavesdropping (MITM)
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
On top of that, it contains vulnerabilities in encryption that expose user keypresses to network eavesdropping (MITM)
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
The Citizen Lab
“Please do not make it public”
In this report, we analyze the Windows, Android, and iOS versions of Tencent’s Sogou Input Method, the most popular Chinese-language input method in China. Our analysis found serious vulnerabilities in the app’s custom encryption system and how it encrypts…
👍10🤬5😁1
Exploiting LPE on Google Pixel 7 running Android 13
The Art of Rooting Android devices by GPU MMU features.
Slides: https://i.blackhat.com/BH-US-23/Presentations/US-23-WANG-The-Art-of-Rooting-Android-devices-by-GPU-MMU-features.pdf
Demo: https://youtu.be/D_AMrLbo3v8
The Art of Rooting Android devices by GPU MMU features.
Slides: https://i.blackhat.com/BH-US-23/Presentations/US-23-WANG-The-Art-of-Rooting-Android-devices-by-GPU-MMU-features.pdf
Demo: https://youtu.be/D_AMrLbo3v8
👀19👍2
ARTful: A library for dynamically modifying the Android Runtime
https://github.com/LaurieWired/ARTful
https://github.com/LaurieWired/ARTful
GitHub
GitHub - LaurieWired/ARTful: The ARTful library for dynamically modifying the Android Runtime
The ARTful library for dynamically modifying the Android Runtime - LaurieWired/ARTful
🔥11👍5❤4
Katalina - new tool that executes Android byte code, enabling to deobfuscate strings in Android malware
It’s written in Python and emulates each individual bytecode instruction that was used back in the day for Android
https://github.com/huuck/Katalina
https://www.humansecurity.com/tech-engineering-blog/katalina-an-open-source-android-string-deobfuscator
It’s written in Python and emulates each individual bytecode instruction that was used back in the day for Android
https://github.com/huuck/Katalina
https://www.humansecurity.com/tech-engineering-blog/katalina-an-open-source-android-string-deobfuscator
GitHub
GitHub - huuck/Katalina: Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android…
Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time. - huuck/Katalina
🔥16👍10❤3
PoC how to trigger Remote Code Execution in Over-the-Air attack targeting Google Pixel 6
Victim perspective: Connect to attacker's fake base station -> receive call -> PWND!
Demo: https://youtu.be/R-XXpG_mZZI
Slides: https://i.blackhat.com/BH-US-23/Presentations/US-23-Karimi-Over-the-Air-Under-the-Radar.pdf
Victim perspective: Connect to attacker's fake base station -> receive call -> PWND!
Demo: https://youtu.be/R-XXpG_mZZI
Slides: https://i.blackhat.com/BH-US-23/Presentations/US-23-Karimi-Over-the-Air-Under-the-Radar.pdf
YouTube
Android Red Team: Over the Air, Under the Radar. Attacking and Securing the Pixel Modem
😱14👍4🔥2
Android Data Encryption in depth
https://blog.quarkslab.com/android-data-encryption-in-depth.html
https://blog.quarkslab.com/android-data-encryption-in-depth.html
Quarkslab
Android Data Encryption in depth - Quarkslab's blog
Join us in our journey into modern Android's Data Encryption at rest, in which we study how it works and assess how resistant it is against attackers having access to a range of high end software vulnerabilities.
👍13
NetHunter Hacker VII: Wi-Fi compatibility check and setup on Android
https://www.mobile-hacker.com/2023/08/15/nethunter-hacker-vii-wi-fi-compatibility-check-and-setup-on-android/
https://www.mobile-hacker.com/2023/08/15/nethunter-hacker-vii-wi-fi-compatibility-check-and-setup-on-android/
Mobile Hacker
NetHunter Hacker VII: Wi-Fi compatibility check and setup on Android Mobile Hacker
If you are interested in Wi-Fi hacking using NetHunter, you need to have a supported Wi-Fi adapter by your system that can supports various wireless modes and features. In this blogpost, we will explain what the different types of Wi-Fi adapters are, how…
👍14❤2🤔1
Mobile Malware Analysis Part 1 – Leveraging Accessibility Features To Steal Crypto Wallet
https://8ksec.io/mobile-malware-analysis-part-1-crypto-wallet-stealer/
https://8ksec.io/mobile-malware-analysis-part-1-crypto-wallet-stealer/
👍14
Forwarded from The Bug Bounty Hunter
Making Chrome more secure by bringing Key Pinning to Android
http://security.googleblog.com/2023/08/making-chrome-more-secure-by-bringing.html
http://security.googleblog.com/2023/08/making-chrome-more-secure-by-bringing.html
Google Online Security Blog
Making Chrome more secure by bringing Key Pinning to Android
Posted by David Adrian, Joe DeBlasio and Carlos Joan Rafael Ibarra Lopez, Chrome Security Chrome 106 added support for enforcing key pins...
👍9❤3👏1🤔1