Forwarded from The Bug Bounty Hunter
Periscope android app deeplink leads to CSRF in follow action https://hackerone.com/reports/583987
HackerOne
X / xAI disclosed on HackerOne: Periscope android app deeplink...
Hello Twitter Team
#Summary
This issue is mainly in the Periscope Android app against CSRF follow action using deeplink.
#Denoscription
In normal Periscope Website, when we share a follow link like...
#Summary
This issue is mainly in the Periscope Android app against CSRF follow action using deeplink.
#Denoscription
In normal Periscope Website, when we share a follow link like...
Forwarded from The Bug Bounty Hunter
ALEAPP - Android Logs Events And Protobuf Parser
https://abrignoni.blogspot.com/2020/02/aleapp-android-logs-events-and-protobuf.html
https://abrignoni.blogspot.com/2020/02/aleapp-android-logs-events-and-protobuf.html
Over 400K private WhatsApp group invite links are exposed to search engines
https://www.xda-developers.com/whatsapp-search-engine-group-invite-links/
https://www.xda-developers.com/whatsapp-search-engine-group-invite-links/
XDA Developers
Over 400K private WhatsApp group invite links are exposed to search engines
A flaw by WhatsApp is allowed hundreds of thousands of private group invite links to be indexed by search engines such as Google.
Android app pentesting using common tools
https://github.com/riddhi-shree/nullCommunity/tree/master/Android
https://github.com/riddhi-shree/nullCommunity/tree/master/Android
Actor selling iOS 0day exploit chain.
includes:
1.Safari RCE
2. LPE - Kernel vulnerability
3. Jailbreak
Price : 2,000,000 Euros
https://twitter.com/underthebreach/status/1231830863362609154
includes:
1.Safari RCE
2. LPE - Kernel vulnerability
3. Jailbreak
Price : 2,000,000 Euros
https://twitter.com/underthebreach/status/1231830863362609154
Awesome iOS Application Security Resources
https://enciphers.com/awesome-ios-application-security/
https://enciphers.com/awesome-ios-application-security/
Bypassing OkHttp Certificate Pinning via Android app patching
Lesson Learned: Always keep an eye on the system log while running the target application.
https://captmeelo.com/pentest/2020/02/24/bypass-okhttp-cert-pinning.html
Lesson Learned: Always keep an eye on the system log while running the target application.
https://captmeelo.com/pentest/2020/02/24/bypass-okhttp-cert-pinning.html
EU Commission to staff: Switch to Signal messaging app
https://www.politico.eu/pro/eu-commission-to-staff-switch-to-signal-messaging-app/
https://www.politico.eu/pro/eu-commission-to-staff-switch-to-signal-messaging-app/
POLITICO Pro
EU Commission to staff: Switch to Signal messaging app
20 Feb 2020 - Pro Article - By Laurens Cerulus
Mobile malware evolution in 2019 by Kaspersky
-slightly more ransomware
-slightly less banking Trojans
-more adware
-more stalkerware
https://securelist.com/mobile-malware-evolution-2019/96280/
-slightly more ransomware
-slightly less banking Trojans
-more adware
-more stalkerware
https://securelist.com/mobile-malware-evolution-2019/96280/
Securelist
Mobile malware evolution 2019
In 2019, Kaspersky mobile products and technologies detected 3,503,952 malicious installation packages, 69,777 new mobile banking Trojans and 68,362 new mobile ransomware Trojans.
How to setup a proxy for security testing in iOS13
https://medium.com/@agu3rra/how-to-setup-a-proxy-for-security-testing-in-ios13-242892e1bf3f
https://medium.com/@agu3rra/how-to-setup-a-proxy-for-security-testing-in-ios13-242892e1bf3f
Medium
How to setup a proxy for security testing in iOS13
So you want to do hunt for bugs in Bug Bounty programs that allow testing of iOS applications, but couldn’t figure out how to take a pick…
KrØØk: Vulnerability affected encryption of billion+ Wi‑Fi devices (iPhone, iPad, Nexus, Samsung Galaxy, RedMi...)
CVE-2019-15126 causes vulnerable devices to use an all-zero encryption key to encrypt part of the user’s communication.
This allows an adversary to decrypt some wireless network packets transmitted by a vulnerable device.
https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/
CVE-2019-15126 causes vulnerable devices to use an all-zero encryption key to encrypt part of the user’s communication.
This allows an adversary to decrypt some wireless network packets transmitted by a vulnerable device.
https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/
WeLiveSecurity
KrØØk: Serious vulnerability affected encryption of billion+ Wi‑Fi devices
ESET researchers uncovered a security flaw affecting Wi-Fi chips that are commonly used in devices such as smartphones, tablets, laptops, and IoT gadgets.
👍1
2020 - Year of the RAT
-Cerberus
-Gustuff
-Hydra
-Ginp
-Anubis
https://www.threatfabric.com/blogs/2020_year_of_the_rat.html
-Cerberus
-Gustuff
-Hydra
-Ginp
-Anubis
https://www.threatfabric.com/blogs/2020_year_of_the_rat.html
ThreatFabric
2020 - Year of the RAT
From simple SMS-stealer to fully-fledged RAT with ATS, criminals continuously innovate to remain successful. This blog provides an overview of the latest trends and expected evolutions in the land of banking Trojans.
LTE Network issue could allow attackers to imporsonate 4G mobile users
https://imp4gt-attacks.net/
https://imp4gt-attacks.net/
What to Look for When Reverse Engineering Android Apps
https://www.nowsecure.com/blog/2020/02/26/what-to-look-for-when-reverse-engineering-android-apps/
https://www.nowsecure.com/blog/2020/02/26/what-to-look-for-when-reverse-engineering-android-apps/
Nowsecure
What to Look for When Reverse Engineering Android Apps - NowSecure
This tutorial will help you master the basics of analyzing an Android app and knowing what to look for as you work to reverse engineer the product.
How to emulate an Android ARM32 and/or ARM64 native library, and an experimental iOS ARM32 emulation
https://github.com/zhkl0228/unidbg
https://github.com/zhkl0228/unidbg
GitHub
GitHub - zhkl0228/unidbg: Allows you to emulate an Android native library, and an experimental iOS emulation
Allows you to emulate an Android native library, and an experimental iOS emulation - zhkl0228/unidbg
A mysterious bug in the firmware of Google's Titan M chip (CVE-2019-9465)
https://alexbakker.me/post/mysterious-google-titan-m-bug-cve-2019-9465.html
https://alexbakker.me/post/mysterious-google-titan-m-bug-cve-2019-9465.html
Alexander Bakker's Blog
A mysterious bug in the firmware of Google's Titan M chip (CVE-2019-9465)
Starting with the release of the Pixel 3, all of Google's Pixel Android smartphones come with the Titan M security chip on board. When I realized the Pixel 3a XL I purchased also had it, I decided to try to take advantage of it in an app I work on. It turned…
Detect static and dynamic tampering of native code
https://darvincitech.wordpress.com/2020/03/01/yet-another-tamper-detection-in-android/
https://darvincitech.wordpress.com/2020/03/01/yet-another-tamper-detection-in-android/
Darvin's Blog
Yet Another Tamper Detection in Android
Android apps are signed by developer private key before uploading to the play store. Every private key has an associated public certificate that devices and services use to verify that the app is f…
Roaming Mantis, part V
SMiShing and enhanced anti-researcher techniques
https://securelist.com/roaming-mantis-part-v/96250/
SMiShing and enhanced anti-researcher techniques
https://securelist.com/roaming-mantis-part-v/96250/
Securelist
Roaming Mantis, part V
Kaspersky has continued to track the Roaming Mantis campaign. The group’s attack methods have improved and new targets continuously added in order to steal more funds.
Bug in Walgreens mobile app (pharmacy app) leaked users' personal data
The app has over 10M installs on Google Play
https://www.zdnet.com/article/walgreens-says-mobile-app-leaked-users-personal-data/
The app has over 10M installs on Google Play
https://www.zdnet.com/article/walgreens-says-mobile-app-leaked-users-personal-data/
ZDNet
Walgreens says mobile app leaked users' personal data
US pharmacy store says mobile app exposed names, prenoscription details, and shipping addresses.
Android Malware Threats - February, 2020
http://skptr.me/malware_timeline_2020.html
samples: https://github.com/sk3ptre/AndroidMalware_2020
http://skptr.me/malware_timeline_2020.html
samples: https://github.com/sk3ptre/AndroidMalware_2020
GitHub
GitHub - sk3ptre/AndroidMalware_2020: Popular Android malware seen in 2020
Popular Android malware seen in 2020. Contribute to sk3ptre/AndroidMalware_2020 development by creating an account on GitHub.
Temp root vulnerability that affects millions of devices with chipsets from MediaTek - CVE-2020-0069
Exploit has been available on XDA-Developers forums since April 2019.
The vulnerability is actively being exploited in the wild.
https://www.xda-developers.com/mediatek-su-rootkit-exploit/
Exploit has been available on XDA-Developers forums since April 2019.
The vulnerability is actively being exploited in the wild.
https://www.xda-developers.com/mediatek-su-rootkit-exploit/
XDA Developers
Critical MediaTek rootkit affecting millions of Android devices has been out in the open for months
A critical flaw in MediaTek processors went unpatched in devices due to OEM neglect. Google hopes the March 2020 Android Security Bulletin will fix this.