Exploiting CVE-2020-0041 - Part 1: Escaping the Chrome Sandbox
https://labs.bluefrostsecurity.de/blog/2020/03/31/cve-2020-0041-part-1-sandbox-escape/
https://labs.bluefrostsecurity.de/blog/2020/03/31/cve-2020-0041-part-1-sandbox-escape/
labs.bluefrostsecurity.de
Exploiting CVE-2020-0041 - Part 1: Escaping the Chrome Sandbox | Bluefrostsecurity
Protecting Android App against Reverse Engineering and Tampering
https://medium.com/avi-parshan-studios/protecting-your-android-app-against-reverse-engineering-and-tampering-a727768b2e9e
https://medium.com/avi-parshan-studios/protecting-your-android-app-against-reverse-engineering-and-tampering-a727768b2e9e
Medium
Protecting your Android App against Reverse Engineering and Tampering
I built a premium (paid) android app that has been cracked and modded. Therefore, I started researching ways to secure my code and make it…
Gained unauthorized Camera access on iOS and macOS
Technical walkthrough of discovered several zero-day bugs in Safari during hunt to hack the iOS/MacOS camera
https://www.ryanpickren.com/webcam-hacking
Technical walkthrough of discovered several zero-day bugs in Safari during hunt to hack the iOS/MacOS camera
https://www.ryanpickren.com/webcam-hacking
Ryan Pickren
Webcam Hacking - Technical Walkthrough | Ryan Pickren
Techincal walkthrough
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps
https://panda.moyix.net/~moyix/papers/inputscope_oakland20.pdf
https://panda.moyix.net/~moyix/papers/inputscope_oakland20.pdf
Android Webview Exploited
http://www.nuckingfoob.me/android-webview-csp-iframe-sandbox-bypass/index.html
http://www.nuckingfoob.me/android-webview-csp-iframe-sandbox-bypass/index.html
Forwarded from The Bug Bounty Hunter
Bypassing Xamarin Certificate Pinning on Android
https://www.gosecure.net/blog/2020/04/06/bypassing-xamarin-certificate-pinning-on-android/
https://www.gosecure.net/blog/2020/04/06/bypassing-xamarin-certificate-pinning-on-android/
GoSecure
24/7 managed detection, response, and expert cybersecurity services - GoSecure
We provide around-the-clock threat detection and incident response, backed by expert consulting to keep your organization secure.
Unkillable xHelper and a Trojan matryoshka
https://securelist.com/unkillable-xhelper-and-a-trojan-matryoshka/96487/
https://securelist.com/unkillable-xhelper-and-a-trojan-matryoshka/96487/
Securelist
Unkillable xHelper and a Trojan matryoshka
It was the middle of last year that we detected the start of mass attacks by the xHelper Trojan on Android smartphones, but even now the malware remains as active as ever.
Subnoscription scam apps found on iOS App Store
These apps charge subnoscription rates around $30 per month after a 3 or 7-day trial period
https://news.sophos.com/en-us/2020/04/08/iphone-fleeceware/
These apps charge subnoscription rates around $30 per month after a 3 or 7-day trial period
https://news.sophos.com/en-us/2020/04/08/iphone-fleeceware/
Sophos News
Don’t let fleeceware sneak into your iPhone
A SophosLabs investigation reveals fleeceware app publishers are also operating on Apple’s App Store for iPhones and iPads
Apple and Google came up with own solution to covid19 contact tracing
-without GPS
-only Bluetooth LE
-in May will release APIs
-user consent is necessity
-should be more secure than country's government own app solution
https://blog.google/inside-google/company-announcements/apple-and-google-partner-covid-19-contact-tracing-technology/
-without GPS
-only Bluetooth LE
-in May will release APIs
-user consent is necessity
-should be more secure than country's government own app solution
https://blog.google/inside-google/company-announcements/apple-and-google-partner-covid-19-contact-tracing-technology/
Google
Apple and Google partner on COVID-19 contact tracing technology
A joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus.
Intercept SSL traffic to perform penetration testing on Android apps using Charles Debug Proxy (Android 7-9)
https://medium.com/@Mayank.Grover/intercept-ssl-traffic-to-perform-penetration-testing-on-android-apps-using-charles-debug-proxy-59211859d22f
https://medium.com/@Mayank.Grover/intercept-ssl-traffic-to-perform-penetration-testing-on-android-apps-using-charles-debug-proxy-59211859d22f
Medium
Intercept SSL traffic to perform penetration testing on Android apps using Charles Debug Proxy
As cybersecurity incidents are increasing at a very high rate, it’s important to know how to pen-test your applications before they go…
Vulnerability Analysis of Android SuperVPN app that allows attacker to exchange VPN gateway
https://youtu.be/ofTts7jlC2Y
https://youtu.be/ofTts7jlC2Y
👍1
OSINT Investigation: Android Cerberus Trojan and the INPS related to COVID19 campaign
https://bushidotoken.blogspot.com/2020/04/osint-investigation-cerberus-and-inps.html
https://bushidotoken.blogspot.com/2020/04/osint-investigation-cerberus-and-inps.html
blog.bushidotoken.net
OSINT Investigation: Cerberus and the INPS
CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security
Virtual machine host for iOS
It allows to run Windows, Android, and more on your iPhone and iPad
https://getutm.app
It allows to run Windows, Android, and more on your iPhone and iPad
https://getutm.app
Firefox for Android fixed 2 vulnerabilities:
-overwriting preference could lead to arbitrary code execution CVE-2020-6828
-URI spoofing CVE-2020-6827
https://www.mozilla.org/en-US/security/advisories/mfsa2020-13/
-overwriting preference could lead to arbitrary code execution CVE-2020-6828
-URI spoofing CVE-2020-6827
https://www.mozilla.org/en-US/security/advisories/mfsa2020-13/
Mozilla
Security Vulnerabilities fixed in Firefox ESR 68.7
TikTok Vulnerability Enables Hackers to Show Users Fake Videos
https://www.mysk.blog/2020/04/13/tiktok-vulnerability-enables-hackers-to-show-users-fake-videos/
https://www.mysk.blog/2020/04/13/tiktok-vulnerability-enables-hackers-to-show-users-fake-videos/
Mysk
TikTok Vulnerability Enables Hackers to Show Users Fake Videos, Mysk
By Talal Haj Bakry and Tommy Mysk UPDATE (MAY 5, 2020): TikTok rolled updates for iOS and Android in May that fixed this vulnerability.
Nice bug chaining found in Xiaomi Mi9 to achieve RCE
Visit attacker website ->...-> download & launch APK
CVE-2020-9530: A redirect vulnerability in a privileged WebView
CVE-2020-9531: XSS in locally stored web pages loaded into a privileged WebView
https://labs.f-secure.com/advisories/xiaomi-mi9/
Visit attacker website ->...-> download & launch APK
CVE-2020-9530: A redirect vulnerability in a privileged WebView
CVE-2020-9531: XSS in locally stored web pages loaded into a privileged WebView
https://labs.f-secure.com/advisories/xiaomi-mi9/
Project Spy - Android and iOS Spyware
https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/
https://blog.trendmicro.com/trendlabs-security-intelligence/coronavirus-update-app-leads-to-project-spy-android-and-ios-spyware/
Trend Micro
Coronavirus Update App Leads to Project Spy Android and iOS Spyware
We discovered a cyberespionage campaign we have named Project Spy infecting Android and iOS devices with spyware by using the coronavirus disease (Covid-19) as a lure.
👍1
XploitSPY: New Android spyware designed by ethical-ish hackers
https://bushidotoken.blogspot.com/2020/04/xploitspy-new-android-spyware-designed.html
https://bushidotoken.blogspot.com/2020/04/xploitspy-new-android-spyware-designed.html
blog.bushidotoken.net
XploitSPY: New Android spyware designed by ethical-ish hackers
CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security
Nation-state Mobile Malware Targets Syrians with COVID-19 Lures
https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures
https://blog.lookout.com/nation-state-mobile-malware-targets-syrians-with-covid-19-lures
Lookout
Nation-State Mobile Malware Targets Syrians with COVID-19 Lures | Threat Intel
Lookout researchers have uncovered a long-running surveillance campaign tied to Syrian nation-state actors.
Android workshop: kernel vulnerability analysis and exploitation (CVE-2019-2215 - Use after Free)
https://cloudfuzz.github.io/android-kernel-exploitation/
https://github.com/cloudfuzz/android-kernel-exploitation
https://cloudfuzz.github.io/android-kernel-exploitation/
https://github.com/cloudfuzz/android-kernel-exploitation
cloudfuzz.github.io
Introduction · Android Kernel Exploitation
Forwarded from The Bug Bounty Hunter
Broken Authentication in Mobile Application
https://medium.com/bugbountywriteup/broken-authentication-in-mobile-application-9f470513a4ab
https://medium.com/bugbountywriteup/broken-authentication-in-mobile-application-9f470513a4ab
Medium
Broken Authentication in Mobile Application
Few months ago I had a penetration test project of a mobile application. I found an interesting vulnerability which made me capable of…