Analysis of ToTok iOS application from App Store
-checkra1n
-iProxy
-Frida
https://objective-see.com/blog/blog_0x52.html
-checkra1n
-iProxy
-Frida
https://objective-see.com/blog/blog_0x52.html
objective-see.org
Mass Surveillance, is an (un)Complicated Business
triaging a massively popular iOS application, with a dark side
Android Malware Scoring System
An Obfuscation-Neglect Android Malware Scoring System
https://github.com/quark-engine/quark-engine
An Obfuscation-Neglect Android Malware Scoring System
https://github.com/quark-engine/quark-engine
GitHub
GitHub - ev-flow/quark-engine: Quark Agent - Your AI-powered Android APK Analyst
Quark Agent - Your AI-powered Android APK Analyst. Contribute to ev-flow/quark-engine development by creating an account on GitHub.
Checkra1n Era - Ep 5 - Automating extraction and processing
https://blog.digital-forensics.it/2019/12/checkra1n-era-ep-5-automating.html
https://blog.digital-forensics.it/2019/12/checkra1n-era-ep-5-automating.html
blog.digital-forensics.it
Checkra1n Era - Ep 5 - Automating extraction and processing (aka "Merry Xmas!")
DFIR research
Total mobile surveillance
Your smartphone can broadcast your exact location thousands of times per day, through hundreds of apps, instantaneously to dozens of different companies. Each of those companies has the power to follow individual mobile phones wherever they go, in near-real time.
https://www.nytimes.com/interactive/2019/12/21/opinion/location-data-privacy-rights.html
Your smartphone can broadcast your exact location thousands of times per day, through hundreds of apps, instantaneously to dozens of different companies. Each of those companies has the power to follow individual mobile phones wherever they go, in near-real time.
https://www.nytimes.com/interactive/2019/12/21/opinion/location-data-privacy-rights.html
Nytimes
Opinion | Total Surveillance Is Not What America Signed Up For (Published 2019)
Congress should take bold action to regulate the location data industry.
3 Steps to Protect Your Phone
1. Stop sharing your location with apps
2. Disable your mobile ad ID
3. Prevent Google from storing your location
https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-privacy-tips.html
1. Stop sharing your location with apps
2. Disable your mobile ad ID
3. Prevent Google from storing your location
https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-privacy-tips.html
Nytimes
Opinion | Freaked Out? 3 Steps to Protect Your Phone (Published 2019)
Tips to prevent your location from being bought and sold.
A security researcher said he has matched 17 million phone numbers to Twitter user accounts by exploiting a flaw in Twitter’s Android app
https://techcrunch.com/2019/12/24/twitter-android-bug-phone-numbers/
https://techcrunch.com/2019/12/24/twitter-android-bug-phone-numbers/
TechCrunch
A Twitter app bug was used to match 17 million phone numbers to user accounts
The researcher matched 17 million phone numbers using the Android app's contact upload feature.
Hunting Credentials and Secrets in iOS Apps #pentest #bugbounty
https://spaceraccoon.dev/low-hanging-apples-hunting-credentials-and-secrets-in-ios-apps
https://spaceraccoon.dev/low-hanging-apples-hunting-credentials-and-secrets-in-ios-apps
spaceraccoon.dev
Low-Hanging Apples: Hunting Credentials and Secrets in iOS Apps
Diving straight into reverse-engineering iOS apps can be daunting and time-consuming. While wading into the binary can pay off greatly in the long run, it’s also useful to start off with the easy wins, especially when you have limited time and resources.…
KTRW: The journey to build a debuggable iPhone
https://media.ccc.de/v/36c3-10806-ktrw_the_journey_to_build_a_debuggable_iphone
https://media.ccc.de/v/36c3-10806-ktrw_the_journey_to_build_a_debuggable_iphone
media.ccc.de
KTRW: The journey to build a debuggable iPhone
Development-fused iPhones with hardware debugging features like JTAG are out of reach for many security researchers. This talk takes you ...
Reverse Engineering of Looney Tunes: Carrot Crazy game
Part 1 - Passwords #retro #GameBoy
https://www.huderlem.com/blog/posts/carrot-crazy-1/
Part 1 - Passwords #retro #GameBoy
https://www.huderlem.com/blog/posts/carrot-crazy-1/
Twitter for Android could allow a bad actor to see nonpublic account information or to control your account (i.e., send Tweets or Direct Messages)
https://privacy.twitter.com/en/blog
https://privacy.twitter.com/en/blog
Remotely Compromising an iPhone through iMessage #presentation
https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage
https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage
media.ccc.de
Messenger Hacking: Remotely Compromising an iPhone through iMessage
So called “0-click” exploits, in which no user interaction is required to compromise a mobile device, have become a highly interesting to...
Unterhering iOS
Running unsigned code at boot on iOS 11. I will demonstrate how you can start out with a daemon config file and end up with kernel code execution
https://media.ccc.de/v/36c3-11034-tales_of_old_untethering_ios_11
Running unsigned code at boot on iOS 11. I will demonstrate how you can start out with a daemon config file and end up with kernel code execution
https://media.ccc.de/v/36c3-11034-tales_of_old_untethering_ios_11
media.ccc.de
Tales of old: untethering iOS 11
This talk is about running unsigned code at boot on iOS 11. I will demonstrate how you can start out with a daemon config file and end up...
Potential risks of secure messaging system
Dive into end-to-end encryption, OTR and deniability, and then the axolotl construction used by Signal #presentation
https://media.ccc.de/v/36c3-10565-what_s_left_for_private_messaging
Dive into end-to-end encryption, OTR and deniability, and then the axolotl construction used by Signal #presentation
https://media.ccc.de/v/36c3-10565-what_s_left_for_private_messaging
media.ccc.de
What's left for private messaging?
It is easier to chat online securely today than it ever has been. Widespread adoption of signal, wire, and the private mode of WhatsApp h...
Lesser-known Tools for Android Application PenTesting
-Magisk + modules
-DisableFlagSecure
-AdbManager
-ProxyDroid
-pidcat
-resize
https://captmeelo.com/pentest/2019/12/30/lesser-known-tools-for-android-pentest.html
-Magisk + modules
-DisableFlagSecure
-AdbManager
-ProxyDroid
-pidcat
-resize
https://captmeelo.com/pentest/2019/12/30/lesser-known-tools-for-android-pentest.html
Mobile Securit Framework (MobSF) v3 (released in December 2019)
-OWASP Mobile Top 10 2016 is supported
-iOS & Android Analysis improved
http://mobsf.github.io/Mobile-Security-Framework-MobSF/changelog.html
-OWASP Mobile Top 10 2016 is supported
-iOS & Android Analysis improved
http://mobsf.github.io/Mobile-Security-Framework-MobSF/changelog.html
Mobile Security Framework (MobSF)
v4.3.0 Changelog
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
Android malware threats of December, 2019
Full list - http://skptr.me/malware_timeline_2019.html
Download samples - https://github.com/sk3ptre/AndroidMalware_2019
Full list - http://skptr.me/malware_timeline_2019.html
Download samples - https://github.com/sk3ptre/AndroidMalware_2019
GitHub
GitHub - sk3ptre/AndroidMalware_2019: Popular Android threats in 2019
Popular Android threats in 2019. Contribute to sk3ptre/AndroidMalware_2019 development by creating an account on GitHub.
iOS Application Injection
https://arjunbrar.com/post/ios-application-injection
https://arjunbrar.com/post/ios-application-injection
You no longer have to manually package the Frida Gadget in your target app. As long as the app is debuggable, Frida does that for you
https://www.nowsecure.com/blog/2020/01/02/how-to-conduct-jailed-testing-with-frida/
https://www.nowsecure.com/blog/2020/01/02/how-to-conduct-jailed-testing-with-frida/
Nowsecure
How to Conduct Jailed Testing with Frida - NowSecure
Recent enhancements to the Frida open-source toolkit greatly ease the process of conducting jailed testing. Learn the process of using Frida on a jailed device.
The recent Android Brazilian Banking Trojan - COYBOT
https://www.buguroo.com/en/blog/banking-malware-in-android-continues-to-grow.-a-look-at-the-recent-brazilian-banking-trojan-basbanke-coybot
https://www.buguroo.com/en/blog/banking-malware-in-android-continues-to-grow.-a-look-at-the-recent-brazilian-banking-trojan-basbanke-coybot