Forwarded from The Bug Bounty Hunter
Blind IDOR in LinkedIn iOS application
https://hailstorm1422.com/linkedin-blind-idor/
https://hailstorm1422.com/linkedin-blind-idor/
Faketoken: full analysis of this dangerous banking Trojan
https://www.buguroo.com/en/blog/faketoken-full-analysis-of-this-dangerous-banking-trojan
https://www.buguroo.com/en/blog/faketoken-full-analysis-of-this-dangerous-banking-trojan
iOS App Static Security Analysis using Frida
https://asciinema.org/a/302160
https://asciinema.org/a/302160
asciinema.org
iOS App Static Security Analysis using Frida
Frida noscript to perform static security analysis of an iOS app Source: https://github.com/interference-security/frida-noscripts/blob/master/iOS/ios-app-static-analysis.js Twitter: https://twitter.com...
ToTok app removed from Google Play for the second time
https://9to5google.com/2020/02/14/google-play-removes-totok/
https://9to5google.com/2020/02/14/google-play-removes-totok/
9to5Google
Messaging app ToTok, allegedly used for mass spying, removed from Google Play again
Last year, the New York Times reported how a chat app gaining traction worldwide was actually being used as a spying tool. Google Play removes ToTok...
No Clicks Required - Exploiting Memory Corruption Vulnerabilities in Messenger Apps
https://saelo.github.io/presentations/offensivecon_20_no_clicks.pdf
https://saelo.github.io/presentations/offensivecon_20_no_clicks.pdf
Static analysis of an Android App #BugBounty
Insecure storage of SMS API credentials -> Takeover the SMS API
https://blog.securitybreached.org/2020/02/19/hacking-sms-api-service-provider-of-a-company-android-app-static-security-analysis-bug-bounty-poc/
Insecure storage of SMS API credentials -> Takeover the SMS API
https://blog.securitybreached.org/2020/02/19/hacking-sms-api-service-provider-of-a-company-android-app-static-security-analysis-bug-bounty-poc/
Security Breached Blog
Hacking SMS API Service Provider of a Company |Android App Static Security Analysis | Bug Bounty POC - Security Breached Blog
This blog post is about static analysis of Android App & due to insecure storage of SMS API credentials I was able to Takeover the SMS API.
Tools and techniques required for iOS applications pentesting https://link.medium.com/Zm1K1eGpd4
Medium
Jailbreak and stuff!! Kickstart tools and techniques for iOS application pentesting
In this article, I have covered most of the tools and techniques required for kickstarting your iOS applications pentesting.
29 iOS PDF File convertors apps upload files via HTTP - Vulnerable to MitM attack
https://www.wandera.com/shadow-it-comet-docs/
https://www.wandera.com/shadow-it-comet-docs/
Wandera
Document management apps exposing files on employee devices
Document management apps failing to encrypt files while transferring them between the user and the cloud-based application that provides the service.
A ‘stalkerware’ Android app - KidsGuard - leaked phone data from thousands of victims
https://techcrunch.com/2020/02/20/kidsguard-spyware-app-phones/
https://techcrunch.com/2020/02/20/kidsguard-spyware-app-phones/
TechCrunch
A 'stalkerware' app leaked phone data from thousands of victims
Exclusive: KidsGuard siphoned off photos, videos, screenshots and call recordings to an unprotected server.
Google removed 600 Android apps from Play Store for Serving Disruptive Ads
Disruptive ads: "Ads that are displayed to users in unexpected ways, including impairing or interfering with the usability of device functions"
https://security.googleblog.com/2020/02/disruptive-ads-enforcement-and-our-new.html
Disruptive ads: "Ads that are displayed to users in unexpected ways, including impairing or interfering with the usability of device functions"
https://security.googleblog.com/2020/02/disruptive-ads-enforcement-and-our-new.html
Google Online Security Blog
Disruptive ads enforcement and our new approach
Posted by Per Bjorke, Senior Product Manager, Ad Traffic Quality As part of our ongoing efforts — along with help from newly developed tec...
Android App Fraud – Haken Clicker and Joker Premium Dialer
https://research.checkpoint.com/2020/android-app-fraud-haken-clicker-and-joker-premium-dialer/
https://research.checkpoint.com/2020/android-app-fraud-haken-clicker-and-joker-premium-dialer/
Check Point Research
Android App Fraud - Haken Clicker and Joker Premium Dialer - Check Point Research
Research by: Ohad Mana, Israel Wernik, Bogdan Melnykov, Aviran Hazum Intro Check Point researchers have recently discovered a new clicker malware family, along with fresh samples of the Joker malware family in Google Play. Throughout this publication we present…
Detailed analysis of Android Joker malware family from Google Play
https://abalabs.com/2020/02/20/a-closer-look-at-the-native-speaking-android-joker-malware-from-google-play/
https://abalabs.com/2020/02/20/a-closer-look-at-the-native-speaking-android-joker-malware-from-google-play/
ABAlabs
A closer look at the native speaking Android Joker malware from Google Play
Hello! This post is an analysis of a variation of the billing fraud Android malware known as Joker that, in this case, utilities a native component (a shared object file, think of it as a Windows D…
Forwarded from The Bug Bounty Hunter
iOS app crashed by specially crafted direct message reactions https://hackerone.com/reports/784676
HackerOne
X (Formerly Twitter) disclosed on HackerOne: iOS app crashed by...
**Summary:** iOS app crashed by specially crafted direct message reactions
**Denoscription:**
Twitter does not properly sanitize direct message reactions, making it possible for arbitrary reaction...
**Denoscription:**
Twitter does not properly sanitize direct message reactions, making it possible for arbitrary reaction...
Forwarded from The Bug Bounty Hunter
Periscope android app deeplink leads to CSRF in follow action https://hackerone.com/reports/583987
HackerOne
X / xAI disclosed on HackerOne: Periscope android app deeplink...
Hello Twitter Team
#Summary
This issue is mainly in the Periscope Android app against CSRF follow action using deeplink.
#Denoscription
In normal Periscope Website, when we share a follow link like...
#Summary
This issue is mainly in the Periscope Android app against CSRF follow action using deeplink.
#Denoscription
In normal Periscope Website, when we share a follow link like...
Forwarded from The Bug Bounty Hunter
ALEAPP - Android Logs Events And Protobuf Parser
https://abrignoni.blogspot.com/2020/02/aleapp-android-logs-events-and-protobuf.html
https://abrignoni.blogspot.com/2020/02/aleapp-android-logs-events-and-protobuf.html
Over 400K private WhatsApp group invite links are exposed to search engines
https://www.xda-developers.com/whatsapp-search-engine-group-invite-links/
https://www.xda-developers.com/whatsapp-search-engine-group-invite-links/
XDA Developers
Over 400K private WhatsApp group invite links are exposed to search engines
A flaw by WhatsApp is allowed hundreds of thousands of private group invite links to be indexed by search engines such as Google.
Android app pentesting using common tools
https://github.com/riddhi-shree/nullCommunity/tree/master/Android
https://github.com/riddhi-shree/nullCommunity/tree/master/Android
Actor selling iOS 0day exploit chain.
includes:
1.Safari RCE
2. LPE - Kernel vulnerability
3. Jailbreak
Price : 2,000,000 Euros
https://twitter.com/underthebreach/status/1231830863362609154
includes:
1.Safari RCE
2. LPE - Kernel vulnerability
3. Jailbreak
Price : 2,000,000 Euros
https://twitter.com/underthebreach/status/1231830863362609154
Awesome iOS Application Security Resources
https://enciphers.com/awesome-ios-application-security/
https://enciphers.com/awesome-ios-application-security/
Bypassing OkHttp Certificate Pinning via Android app patching
Lesson Learned: Always keep an eye on the system log while running the target application.
https://captmeelo.com/pentest/2020/02/24/bypass-okhttp-cert-pinning.html
Lesson Learned: Always keep an eye on the system log while running the target application.
https://captmeelo.com/pentest/2020/02/24/bypass-okhttp-cert-pinning.html