How to dump Samsung Galaxy S7 boot ROM using known and fixed security vulnerabilities in Trustzone
https://fredericb.info/2020/06/exynos8890-bootrom-dump-dump-exynos-8890-bootrom-from-samsung-galaxy-s7.html
Source code: https://github.com/frederic/exynos8890-bootrom-dump
https://fredericb.info/2020/06/exynos8890-bootrom-dump-dump-exynos-8890-bootrom-from-samsung-galaxy-s7.html
Source code: https://github.com/frederic/exynos8890-bootrom-dump
fred's notes
exynos8890-bootrom-dump : dump Exynos 8890 bootROM from Samsung Galaxy S7
This post introduces a tool to dump Samsung Galaxy S7 bootROM using known and fixed security vulnerabilities in Trustzone. The source code is available on GitHub. Procedure We use a Galaxy S7 phone, with ADB access and root privileges. BootROM code is at…
FBI announcement: Increased Use of Mobile Banking Apps Could Lead to Exploitation
https://www.ic3.gov/media/2020/200610.aspx
https://www.ic3.gov/media/2020/200610.aspx
Intel agencies red-flag use of 52 mobile apps with links to China: Complete list
https://www.hindustantimes.com/india-news/intel-agencies-red-flag-use-of-52-mobile-apps-with-links-to-china-complete-list/story-B50Slf39aSnVOrCcS92l1N.html
https://www.hindustantimes.com/india-news/intel-agencies-red-flag-use-of-52-mobile-apps-with-links-to-china-complete-list/story-B50Slf39aSnVOrCcS92l1N.html
Hindustan Times
Intelligence agencies red-flag use of 52 mobile apps with links to China
The National Security Council Secretariat has backed the recommendation to block or discourage use of 53 mobile apps
Forwarded from The Bug Bounty Hunter
Intercepting Flutter traffic on iOS
https://blog.nviso.eu/2020/06/12/intercepting-flutter-traffic-on-ios/
https://blog.nviso.eu/2020/06/12/intercepting-flutter-traffic-on-ios/
NVISO Labs
Intercepting Flutter traffic on iOS
My previous blogposts explained how to intercept Flutter traffic on Android ARMv8, with a detailed follow along guide for ARMv7. This blogpost does the same for iOS. ⚠️ Update August 2022 ⚠️An upda…
Trump 2020 Campaign Exposed to Attack via App
https://www.websiteplanet.com/blog/trump-app-vulnerability-report/
https://www.websiteplanet.com/blog/trump-app-vulnerability-report/
Website Planet
Trump 2020 Campaign Exposed to Attack via App
Led by renowned cybersecurity analysts Noam Rotem and Ran Locar, our security research team recently discovered a security vulnerability in US
Bugbounty Cheatsheet for the infosec community
It covers Recon workflow, Webapp bugs, Mobile app bugs, API bugs, checklist, tools used, etc. Via Adam Swartz
https://docs.google.com/spreadsheets/d/1TxNrvaIMRS_dmupcwjwJmXtaFk_lPGE1LzgxPu_7KqA/edit?fbclid=IwAR3dktvcemzjYc7OvA-vu6MQMiI9_EpIS4Ei3C7TGKFgMWUG3eWPx2sUr3E#gid=1308919623
It covers Recon workflow, Webapp bugs, Mobile app bugs, API bugs, checklist, tools used, etc. Via Adam Swartz
https://docs.google.com/spreadsheets/d/1TxNrvaIMRS_dmupcwjwJmXtaFk_lPGE1LzgxPu_7KqA/edit?fbclid=IwAR3dktvcemzjYc7OvA-vu6MQMiI9_EpIS4Ei3C7TGKFgMWUG3eWPx2sUr3E#gid=1308919623
Google Docs
Bugbounty cheatsheet - Mohammed Adam(twitter.com/iam_amdadam)
Recon
Recon workflow
Horizontal & vertical Correlations
<a href="https://mxtoolbox.com/asn.aspx">https://mxtoolbox.com/asn.aspx</a>
<a href="https://viewdns.info/reversewhois">https://viewdns.info/reversewhois</a>
<a href="https://domaineye.com/">https:…
Recon workflow
Horizontal & vertical Correlations
<a href="https://mxtoolbox.com/asn.aspx">https://mxtoolbox.com/asn.aspx</a>
<a href="https://viewdns.info/reversewhois">https://viewdns.info/reversewhois</a>
<a href="https://domaineye.com/">https:…
Ginp banking Trojan on the rise
https://securityintelligence.com/posts/ginp-malware-operations-rising-expansions-turkey/
https://securityintelligence.com/posts/ginp-malware-operations-rising-expansions-turkey/
Security Intelligence
Ginp Malware Operations are on the Rise with Expansions in Turkey
The Ginp mobile banking malware, which emerged in late 2019, is one of the top Android banking malware families today. Read on to learn more about how Ginp is impacting Android malware in the past 90 days.
Purposefully Insecure and Vulnerable Android Application (PIVAA)
Part 1: https://medium.com/@timmccann222/purposefully-insecure-and-vulnerable-android-application-pivaa-part-1-6af8941b54d3
Part 2: https://medium.com/@timmccann222/purposefully-insecure-and-vulnerable-android-application-pivaa-part-2-34c838bd4a0b?source=linkShare-1764222123d3-1592496527&_branch_match_id=602531711872894297
Part 3: https://medium.com/@timmccann222/purposefully-insecure-and-vulnerable-android-application-pivaa-part-3-e5d0f58ad05
PIVAA: https://github.com/htbridge/pivaa
Part 1: https://medium.com/@timmccann222/purposefully-insecure-and-vulnerable-android-application-pivaa-part-1-6af8941b54d3
Part 2: https://medium.com/@timmccann222/purposefully-insecure-and-vulnerable-android-application-pivaa-part-2-34c838bd4a0b?source=linkShare-1764222123d3-1592496527&_branch_match_id=602531711872894297
Part 3: https://medium.com/@timmccann222/purposefully-insecure-and-vulnerable-android-application-pivaa-part-3-e5d0f58ad05
PIVAA: https://github.com/htbridge/pivaa
Medium
Purposefully Insecure and Vulnerable Android Application (PIVAA): Part 1
This article is the first part in a series that will cover some of the different vulnerabilities present in the “Purposefully Insecure and…
Reverse Engineering Snapchat (Part I): Obfuscation Techniques
https://hot3eed.github.io/snap_part1_obfuscations.html
https://hot3eed.github.io/snap_part1_obfuscations.html
The secret life of GPS trackers
Part 1: https://decoded.avast.io/martinhron/the-secret-life-of-gps-trackers/
Part 2: https://decoded.avast.io/martinhron/the-secret-life-of-gps-trackers-2-2/
Part 1: https://decoded.avast.io/martinhron/the-secret-life-of-gps-trackers/
Part 2: https://decoded.avast.io/martinhron/the-secret-life-of-gps-trackers-2-2/
Avast Threat Labs
The secret life of GPS trackers (1/2) - Avast Threat Labs
Cheap GPS trackers can come handy in every situation, for your car, relatives, kids. But it turns out that many of them share the same flaws. Unsecured communications, default passwords and cloud environment that is far from secure.
Kuwait and Bahrain have published some of the most invasive Covid-19 contact-tracing apps in the world, putting the privacy and security of their users at risk, Amnesty International says
https://www.bbc.com/news/world-middle-east-53052395
https://www.bbc.com/news/world-middle-east-53052395
BBC News
Coronavirus: Alarm over 'invasive' Kuwait and Bahrain contact-tracing apps
Kuwait and Bahrain's apps put users' privacy and security at risk, Amnesty International says.
Analysis of Cerberus banking Trojan distributed over phishing websites (Amazon and NetBank)
https://labs.k7computing.com/?p=20468
https://labs.k7computing.com/?p=20468
K7 Labs
Mal Campaign Targets Android users - K7 Labs
Covid-19 pandemic has changed people’s behaviour significantly. Be it maintaining social distance, washing their hands more frequently, more of online […]
Analysis of Android Medical Malware, by Cryptax
https://youtu.be/n4YPM53igdw
https://youtu.be/n4YPM53igdw
YouTube
(EN) Medical Malware on Android analysis, by Cryptax - SecSea 2020
(Links and docs below) Last but not least, Cryptax introduce us a full analysis of a medical malware on Android, with a step by step retroengineering and examination of an app!
This is the last conference we have for you this year... but do not be sad. We'll…
This is the last conference we have for you this year... but do not be sad. We'll…
BitterAPT Revisited: the Untold Evolution of an Android Espionage Tool
https://www.bitdefender.com/files/News/CaseStudies/study/352/Bitdefender-PR-Whitepaper-BitterAPT-creat4571-en-EN-GenericUse.pdf
https://www.bitdefender.com/files/News/CaseStudies/study/352/Bitdefender-PR-Whitepaper-BitterAPT-creat4571-en-EN-GenericUse.pdf
FridaLoader: Auto-downloads the Frida server based off the architecture of the device/emulator
https://github.com/dineshshetty/FridaLoader
https://github.com/dineshshetty/FridaLoader
GitHub
GitHub - dineshshetty/FridaLoader: A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android…
A quick and dirty app to download and launch Frida on Genymotion and rooted Physical Android Devices - dineshshetty/FridaLoader
👍1
COVIDSafe-CVE-2020-12856: A silent pairing issue in bluetooth-based contact tracing apps
https://github.com/alwentiu/COVIDSafe-CVE-2020-12856
https://github.com/alwentiu/COVIDSafe-CVE-2020-12856
GitHub
GitHub - alwentiu/COVIDSafe-CVE-2020-12856: A bluetooth-related vulnerability in some contact tracing apps
A bluetooth-related vulnerability in some contact tracing apps - GitHub - alwentiu/COVIDSafe-CVE-2020-12856: A bluetooth-related vulnerability in some contact tracing apps
Forwarded from The Bug Bounty Hunter
Reverse Engineering Snapchat (Part II): Debofuscating the Undeobfuscatable
https://hot3eed.github.io/2020/06/22/snap_p2_deobfuscation.html
https://hot3eed.github.io/2020/06/22/snap_p2_deobfuscation.html
hot3eed.github.io
Reverse Engineering Snapchat (Part II): Deobfuscating the Undeobfuscatable
Reverse Engineering Snapchat (Part II): Deobfuscating the Undeobfuscatable 2020-06-22
Collection of writeups, cheatsheets, videos, related to Android Pentesting
https://github.com/jdonsec/AllThingsAndroid
https://github.com/jdonsec/AllThingsAndroid
GitHub
GitHub - jdonsec/AllThingsAndroid: A Collection of Android Pentest Learning Materials
A Collection of Android Pentest Learning Materials - jdonsec/AllThingsAndroid
Moroccan Journalist Targeted With Network Injection Attacks Using NSO Group’s Tools #iPhone
https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/
https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/
Amnesty International
Moroccan Journalist Targeted With Network Injection Attacks Using NSO Group’s Tools
In October 2019 Amnesty International published a first report on the use of spyware produced by Israeli company NSO Group against Moroccan human rights defenders Maati Monjib and Abdessadak El Bouchattaoui. Through our continued investigation, Amnesty International’s…
Let's Reverse Engineer an Android App!
Beginners guide
https://yasoob.me/posts/reverse-engineering-android-apps-apktool/
Beginners guide
https://yasoob.me/posts/reverse-engineering-android-apps-apktool/
yasoob.me
Let's Reverse Engineer an Android App! - Yasoob Khalid
I had always wanted to learn how to reverse engineer Android apps. There were people out there who knew how to navigate and modify the internals of an APK file and I wasn’t one of them. This had to be changed but it took a long time for that to happen. In…