Android IPC: Part 2 - Binder and Service Manager Perspective
https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=48
https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=48
Cerberus distributed over company's MDM server
https://research.checkpoint.com/2020/first-seen-in-the-wild-mobile-as-attack-vector-using-mdm/
https://research.checkpoint.com/2020/first-seen-in-the-wild-mobile-as-attack-vector-using-mdm/
Check Point Research
First seen in the wild - Malware uses Corporate MDM as attack vector - Check Point Research
Research by: Aviran Hazum, Bogdan Melnykov, Chana Efrati, Danil Golubenko, Israel Wernik, Liav Kuperman, Ohad Mana Overview: Check Point researchers discovered a new Cerberus variant which is targeting a multinational conglomerate, and is distributed by the…
EventBot: A Android Banking Trojan analysis
https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born
https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born
Cybereason
EventBot: A New Mobile Banking Trojan is Born
The Cybereason Nocturnus team is investigating EventBot, a new type of Android mobile malware. EventBot abuses accessibility features to steal user data from financial applications, read user SMS messages, and steal SMS messages to allow the malware to bypass…
Forwarded from The Bug Bounty Hunter
Stealing your SMS messages with iOS 0day
https://wojciechregula.blog/post/stealing-your-sms-messages-with-ios-0day/
https://wojciechregula.blog/post/stealing-your-sms-messages-with-ios-0day/
wojciechregula.blog
Stealing your SMS messages with iOS 0day
This is a special post because I fully based on another researcher, s1guza’s 0day. All of this story began from the following tweet:
Siguza told us that his 0day was patched in the iOS 13.5 beta3. So this is actually a sandbox escape 0day for the newest,…
Siguza told us that his 0day was patched in the iOS 13.5 beta3. So this is actually a sandbox escape 0day for the newest,…
Popular Android malware threats - April, 2020
http://skptr.me/malware_timeline_2020.html
Samples: https://github.com/sk3ptre/AndroidMalware_2020
http://skptr.me/malware_timeline_2020.html
Samples: https://github.com/sk3ptre/AndroidMalware_2020
GitHub
GitHub - sk3ptre/AndroidMalware_2020: Popular Android malware seen in 2020
Popular Android malware seen in 2020. Contribute to sk3ptre/AndroidMalware_2020 development by creating an account on GitHub.
Xiaomi Recording Millions Of People’s ‘Private’ Web And Phone Use
https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use
https://www.forbes.com/sites/thomasbrewster/2020/04/30/exclusive-warning-over-chinese-mobile-giant-xiaomi-recording-millions-of-peoples-private-web-and-phone-use
Forbes
Exclusive: Warning Over Chinese Mobile Giant Xiaomi Recording Millions Of People’s ‘Private’ Web And Phone Use
Xiaomi is collecting users’ browser habits and phone usage, raising red flags for privacy researchers.
Forwarded from The Bug Bounty Hunter
AndroPyTool
A framework for automated extraction of static and dynamic features from Android applications
https://github.com/alexMyG/AndroPyTool#how-to-install
A framework for automated extraction of static and dynamic features from Android applications
https://github.com/alexMyG/AndroPyTool#how-to-install
GitHub
GitHub - alexMyG/AndroPyTool: A framework for automated extraction of static and dynamic features from Android applications
A framework for automated extraction of static and dynamic features from Android applications - alexMyG/AndroPyTool
Reverse engineering Flutter apps
Build process of Flutter applications and explain in detail how to reverse engineer the code
https://blog.tst.sh/reverse-engineering-flutter-apps-part-1/
Build process of Flutter applications and explain in detail how to reverse engineer the code
https://blog.tst.sh/reverse-engineering-flutter-apps-part-1/
ping's blog
Reverse engineering Flutter apps (Part 1)
Chapter 1: Down the rabbit hole
To start this journey I'll cover some backstory on the Flutter stack and how it works.
What you probably already know: Flutter was built from the ground up with its own render pipeline and widget library, allowing it to…
To start this journey I'll cover some backstory on the Flutter stack and how it works.
What you probably already know: Flutter was built from the ground up with its own render pipeline and widget library, allowing it to…
List of iOS applications related to COVID-19 with capabilities and permissions they request
https://github.com/ivRodriguezCA/Covid19-Mobile-Apps
https://github.com/ivRodriguezCA/Covid19-Mobile-Apps
GitHub
GitHub - ivRodriguezCA/Covid19-Mobile-Apps: List of the most popular COVID10 mobile applications and the permissions they request.
List of the most popular COVID10 mobile applications and the permissions they request. - GitHub - ivRodriguezCA/Covid19-Mobile-Apps: List of the most popular COVID10 mobile applications and the per...
Forwarded from The Bug Bounty Hunter
Android Application Penetration Testing / Bug Bounty Checklist
https://blog.softwaroid.com/2020/05/02/android-application-penetration-testing-bug-bounty-checklist/
https://blog.softwaroid.com/2020/05/02/android-application-penetration-testing-bug-bounty-checklist/
Hacking/OSCP cheatsheet
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
30 Reverse Engineering Tips & Tricks
https://blog.vastart.dev/2020/04/guys-30-reverse-engineering-tips-tricks.html
https://blog.vastart.dev/2020/04/guys-30-reverse-engineering-tips-tricks.html
👍1
Cheatsheets for all vulnerabilities
https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets
GitHub
CheatSheetSeries/cheatsheets at master · OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. - OWASP/CheatSheetSeries
Android SLocker uses Coronavirus scare to lock smartphones
https://labs.bitdefender.com/2020/05/android-slocker-variant-uses-coronavirus-scare-to-take-android-hostage/
https://labs.bitdefender.com/2020/05/android-slocker-variant-uses-coronavirus-scare-to-take-android-hostage/
Bitdefender Labs
Android SLocker Variant Uses Coronavirus Scare to Take Android Hostage
The coronavirus pandemic is an opportunity for criminals who try to take advantage of people’s thirst for information. Unfortunately, Android users can fall prey to... #android #covid19 #ransomware
PENETRATION TESTING PRACTICE LAB - VULNERABLE APPS / SYSTEMS
https://www.amanhardikar.com/mindmaps/Practice.html
https://www.amanhardikar.com/mindmaps/Practice.html
Reverse Engineering the Australian Government’s Coronavirus iOS app
https://medium.com/@wabz/reverse-engineering-the-australian-governments-coronavirus-ios-application-c08790e895e9
https://medium.com/@wabz/reverse-engineering-the-australian-governments-coronavirus-ios-application-c08790e895e9
Medium
Reverse Engineering the Australian Government’s Coronavirus iOS application
On the 29th of March, the Australian Government launched an iOS application on the AppStore. It’s a pretty neat little app with lots of…
Hacking "Razer Pay" e-wallet Android app
Attacker could:
-delete other user's bank account
-extract other user's private info
-possibly steal money from other user's bank account
-read other user's chat messages
https://blog.sambal0x.com/2020/04/30/Hacking-razer-pay-ewallet-app.html
Attacker could:
-delete other user's bank account
-extract other user's private info
-possibly steal money from other user's bank account
-read other user's chat messages
https://blog.sambal0x.com/2020/04/30/Hacking-razer-pay-ewallet-app.html
Richard’s Infosec blog
Hacking Razer Pay Ewallet App
Introduction This write-up is about hacking the Razer Pay Android app - an E-Wallet app used in Singapore and Malaysia. It was an interesting journey worth blogging due to the use of some interesting techniques including Frida, a tool that I only thought…
Frida Cheatsheet and Code Snippets for Android
https://erev0s.com/blog/frida-code-snippets-for-android/
https://erev0s.com/blog/frida-code-snippets-for-android/
Erev0S
Frida code snippets for Android
Quick reference guide for Frida code snippets used for Android dynamic instrumentation.
Offensive Security Bookmarks Collection
https://jivoi.github.io/2015/07/03/offensive-security-bookmarks/
https://jivoi.github.io/2015/07/03/offensive-security-bookmarks/
EK
Offensive Security Bookmarks
My security bookmarks collection.