rvi_capture
A utility to create packet capture dumps from iOS devices (for debugging network activity via Wireshark)
https://github.com/gh2o/rvi_capture
A utility to create packet capture dumps from iOS devices (for debugging network activity via Wireshark)
https://github.com/gh2o/rvi_capture
GitHub
GitHub - gh2o/rvi_capture: rvictl for Linux and Windows: capture packets sent/received by iOS devices
rvictl for Linux and Windows: capture packets sent/received by iOS devices - gh2o/rvi_capture
Overview of mobile malware detected in January 2020 by Doctor Web
https://news.drweb.com/show/?i=13669&lng=en
https://news.drweb.com/show/?i=13669&lng=en
Dr.Web
Dr.Web — Doctor Web’s January 2020 overview of malware detected on mobile devices
Find out on Doctor Web’s site about the latest virus threats and information security issues.
Android security research, with focus on Arm TrustZone
Understanding Trusted Execution Environments and the Arm TrustZone Technology
https://azeria-labs.com/trusted-execution-environments-tee-and-trustzone/
Understanding Trusted Execution Environments and the Arm TrustZone Technology
https://azeria-labs.com/trusted-execution-environments-tee-and-trustzone/
Azeria-Labs
Trusted Execution Environments and Arm TrustZone
How Google Play fought bad apps and malicious developers in 2019
https://android-developers.googleblog.com/2020/02/how-we-fought-bad-apps-and-malicious.html
https://android-developers.googleblog.com/2020/02/how-we-fought-bad-apps-and-malicious.html
Android Developers Blog
How we fought bad apps and malicious developers in 2019
Posted by Andrew Ahn, Product Manager, Google Play + Android App Safety Google Play connects users with great digital experiences t...
Android Trojan xHelper uses persistent re-infection tactics: here’s how to remove
https://blog.malwarebytes.com/android/2020/02/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play/
https://blog.malwarebytes.com/android/2020/02/new-variant-of-android-trojan-xhelper-reinfects-with-help-from-google-play/
Malwarebytes
Android Trojan xHelper uses persistent re-infection tactics: here's how to remove | Malwarebytes Labs
A new variant of the Android Trojan xHelper re-infects just hours after removal—and with the help of Google PLAY?! A forum user helps us investigate.
Memory corruption in Samsung's Android kernel (Galaxy A50, A505FN)
https://googleprojectzero.blogspot.com/2020/02/mitigations-are-attack-surface-too.html
https://googleprojectzero.blogspot.com/2020/02/mitigations-are-attack-surface-too.html
Blogspot
Mitigations are attack surface, too
Posted by Jann Horn, Project Zero Introduction This blog post discusses a bug leading to memory corruption in Samsung's Android kern...
Forwarded from The Bug Bounty Hunter
INTRODUCTION TO ANDROID HACKING BY @0XTEKNOGEEK
https://www.hackerone.com/blog/androidhackingmonth-intro-to-android-hacking
https://www.hackerone.com/blog/androidhackingmonth-intro-to-android-hacking
HackerOne
Guess what's coming!? #AndroidHackingMonth on @Hacker0x01
Mobile hacking has become an essential part of the bug bounty hunter’s tool belt as more and more companies are doubling down on mobile and investing in the security of their iOS and Android applications. As part of our determination to ensure you have the…
Analysis of techniques to bypass the Android Security Config control with Frida
https://neo-geo2.gitbook.io/adventures-on-security/frida/analysis-of-network-security-configuration-bypasses-with-frida
https://neo-geo2.gitbook.io/adventures-on-security/frida/analysis-of-network-security-configuration-bypasses-with-frida
neo-geo2.gitbook.io
Analysis of Network Security Configuration bypasses with Frida | Adventures on Security
Analysis of techniques to bypass the Android Security Config control with Frida
Bad Binder - Finding an Android In The Wild 0-day
https://github.com/maddiestone/ConPresentations/blob/master/OffensiveCon2020.BadBinder.pdf
https://github.com/maddiestone/ConPresentations/blob/master/OffensiveCon2020.BadBinder.pdf
GitHub
ConPresentations/OffensiveCon2020.BadBinder.pdf at master · maddiestone/ConPresentations
Slide decks from my conference presentations. Contribute to maddiestone/ConPresentations development by creating an account on GitHub.
Detecting Memory Corruption Bugs With HWASan in Android
https://android-developers.googleblog.com/2020/02/detecting-memory-corruption-bugs-with-hwasan.html
https://android-developers.googleblog.com/2020/02/detecting-memory-corruption-bugs-with-hwasan.html
Android Developers Blog
Detecting Memory Corruption Bugs With HWASan
Posted by Evgenii Stepanov, Staff Software Engineer, Dynamic Tools Native code in memory-unsafe languages like C and C++ is often vuln...
Malwarebytes Labs releases 2020 State of Malware Report
https://resources.malwarebytes.com/files/2020/02/2020_State-of-Malware-Report.pdf
https://resources.malwarebytes.com/files/2020/02/2020_State-of-Malware-Report.pdf
Forwarded from The Bug Bounty Hunter
JAVASCRIPT INJECTION IN SIX ANDROID MAIL CLIENTS
https://www.gubello.me/blog/javanoscript-injection-in-six-android-mail-clients/
https://www.gubello.me/blog/javanoscript-injection-in-six-android-mail-clients/
Blog un po' nerd
Javanoscript Injection in six Android mail clients
During last spring (2019) I started to “open and read” the Android applications before installing them. Reversing an APK file can be interesting to understand how an app works, how it manages the permissions and my data, if there are vulnerabilities. I was…