Forwarded from The Bug Bounty Hunter
Reverse Engineering Snapchat (Part II): Debofuscating the Undeobfuscatable
https://hot3eed.github.io/2020/06/22/snap_p2_deobfuscation.html
https://hot3eed.github.io/2020/06/22/snap_p2_deobfuscation.html
hot3eed.github.io
Reverse Engineering Snapchat (Part II): Deobfuscating the Undeobfuscatable
Reverse Engineering Snapchat (Part II): Deobfuscating the Undeobfuscatable 2020-06-22
Collection of writeups, cheatsheets, videos, related to Android Pentesting
https://github.com/jdonsec/AllThingsAndroid
https://github.com/jdonsec/AllThingsAndroid
GitHub
GitHub - jdonsec/AllThingsAndroid: A Collection of Android Pentest Learning Materials
A Collection of Android Pentest Learning Materials - jdonsec/AllThingsAndroid
Moroccan Journalist Targeted With Network Injection Attacks Using NSO Group’s Tools #iPhone
https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/
https://www.amnesty.org/en/latest/research/2020/06/moroccan-journalist-targeted-with-network-injection-attacks-using-nso-groups-tools/
Amnesty International
Moroccan Journalist Targeted With Network Injection Attacks Using NSO Group’s Tools
In October 2019 Amnesty International published a first report on the use of spyware produced by Israeli company NSO Group against Moroccan human rights defenders Maati Monjib and Abdessadak El Bouchattaoui. Through our continued investigation, Amnesty International’s…
Let's Reverse Engineer an Android App!
Beginners guide
https://yasoob.me/posts/reverse-engineering-android-apps-apktool/
Beginners guide
https://yasoob.me/posts/reverse-engineering-android-apps-apktool/
yasoob.me
Let's Reverse Engineer an Android App! - Yasoob Khalid
I had always wanted to learn how to reverse engineer Android apps. There were people out there who knew how to navigate and modify the internals of an APK file and I wasn’t one of them. This had to be changed but it took a long time for that to happen. In…
HiddenAds up to no good again and spreading via Android gaming apps
https://decoded.avast.io/jakubvavra/hiddenads-up-to-no-good-again-and-spreading-via-android-gaming-apps/
https://decoded.avast.io/jakubvavra/hiddenads-up-to-no-good-again-and-spreading-via-android-gaming-apps/
Avast Threat Labs
HiddenAds up to no good again and spreading via Android gaming apps - Avast Threat Labs
I recently discovered a large campaign of HiddenAds on the Google Play Store, spreading via gaming apps. The initial discovery was made through an apklab.io automated detection that was based on similar features of a previous HiddenAds campaign that was present…
Forwarded from The Bug Bounty Hunter
The Top 5 Most Common Mobile App Security Flaws
https://www.allysonomalley.com/2020/06/23/the-top-5-most-common-mobile-app-security-flaws/
https://www.allysonomalley.com/2020/06/23/the-top-5-most-common-mobile-app-security-flaws/
allysonomalley.com
The Top 5 Most Common Mobile App Security Flaws
Whether you’re a pentester looking to gain some experience in mobile hacking or a developer aiming to build secure apps, familiarizing yourself with some of the common security mistakes developers …
New Android ransomware family identified + decryption tool created (because of the security issue in the code) #CryCryptor
https://www.welivesecurity.com/2020/06/24/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor/
https://www.welivesecurity.com/2020/06/24/new-ransomware-uses-covid19-tracing-guise-target-canada-eset-decryptor/
WeLiveSecurity
New ransomware posing as COVID‑19 tracing app targets Canada; ESET offers decryptor
ESET researchers dissect an Android app that masquerades as an official COVID-19 contact-tracing app and encrypts files on the victim's device.
France’s COVID-19 tracing app has been downloaded and activated 1.8M times on Android and iOS since launch on 2 June... but then uninstalled 460,000 times.
Src: https://twitter.com/gcluley/status/1275720504092102656
Src: https://twitter.com/gcluley/status/1275720504092102656
Twitter
Graham Cluley
France’s COVID-19 tracing app has been downloaded and activated 1.8m times on Android and iOS since launch on 2 June... but then uninstalled 460,000 times.
The #RoamingMantis group targets Android and iOS devices (phishing Apple ID) in Europe #FakeCop
https://medium.com/csis-techblog/the-roamingmantis-groups-expansion-to-european-apple-accounts-and-android-devices-e6381723c681
https://medium.com/csis-techblog/the-roamingmantis-groups-expansion-to-european-apple-accounts-and-android-devices-e6381723c681
Medium
The RoamingMantis Group’s Expansion to European Apple Accounts and Android Devices
Background
iOS/MacOS wifi proximity kernel double free in AWDL BSS Steering
https://bugs.chromium.org/p/project-zero/issues/detail?id=2012
https://bugs.chromium.org/p/project-zero/issues/detail?id=2012
TikTok Secretly Spying On Clipboard of Millions iPhone Users
https://www.forbes.com/sites/zakdoffman/2020/06/26/warning-apple-suddenly-catches-tiktok-secretly-spying-on-millions-of-iphone-users/amp/
https://www.forbes.com/sites/zakdoffman/2020/06/26/warning-apple-suddenly-catches-tiktok-secretly-spying-on-millions-of-iphone-users/amp/
Forbes
Warning—Apple Suddenly Catches TikTok Secretly Spying On Millions Of iPhone Users
If you are a TikTok user, you should be worried—here's what you need to know.
Android malware detection based on image-based features and machine learning techniques
https://link.springer.com/article/10.1007/s42452-020-3132-2
https://link.springer.com/article/10.1007/s42452-020-3132-2
SpringerLink
Android malware detection based on image-based features and machine learning techniques
SN Applied Sciences - In this paper, a malware classification model has been proposed for detecting malware samples in the Android environment. The proposed model is based on converting some files...
Debugging the Samsung Android Kernel
Part 1: https://blog.pucarasec.com/2020/06/09/debugging-the-samsung-android-kernel-part-1/
Part 2: https://blog.pucarasec.com/2020/06/16/debugging-the-samsung-android-kernel-part-2/
Part 3: https://blog.pucarasec.com/2020/06/23/debugging-the-samsung-android-kernel-part-3/
Part 1: https://blog.pucarasec.com/2020/06/09/debugging-the-samsung-android-kernel-part-1/
Part 2: https://blog.pucarasec.com/2020/06/16/debugging-the-samsung-android-kernel-part-2/
Part 3: https://blog.pucarasec.com/2020/06/23/debugging-the-samsung-android-kernel-part-3/
Posts by Pucara Information Security Team
Debugging the Samsung Android Kernel part 1:
Compiling a custom Samsung Android Kernel, and living to tell the tale. Many security enthusiasts and sysadmins are familiar with the process in which one custom compiles a Linux Kernel and th…
Forwarded from The Bug Bounty Hunter
Android App Source code Extraction and Bypassing Root and SSL Pinning checks
https://vj0shii.github.io/android-app-testing-initial-steps/
https://vj0shii.github.io/android-app-testing-initial-steps/
vj0shii.github.io
Android App Source code Extraction and Bypassing Root and SSL Pinning checks
In this blog I will be describing the pre-requesty steps I followed for one of the android application penetration testing
SafetyNet’s dreaded hardware attestation is rolling out, making it much harder for Magisk to hide root
https://www.xda-developers.com/safetynet-hardware-attestation-hide-root-magisk/
https://www.xda-developers.com/safetynet-hardware-attestation-hide-root-magisk/
XDA
SafetyNet's dreaded hardware attestation is rolling out, making it much harder for Magisk to hide root
Hiding root access in Magisk is about to become a whole lot harder to do thanks to a recent change in SafetyNet bringing hardware attestation.
Android 11
Privacy updates:
•Auto-reset permissions from unused apps!
•Package visibility: can't list installed apps!
•New, clearer permission to obtain user phone number!
•One-time permissions (temp granted permissions)
•Background location access
•Scoped Storage
https://developer.android.com/preview/privacy
Privacy updates:
•Auto-reset permissions from unused apps!
•Package visibility: can't list installed apps!
•New, clearer permission to obtain user phone number!
•One-time permissions (temp granted permissions)
•Background location access
•Scoped Storage
https://developer.android.com/preview/privacy
Android Developers
Privacy in Android 11 | Platform | Android Developers
Read about the privacy changes in Android 11 and learn how to support them in your apps.
Intercept & view all Android HTTP(S)
Mock endpoints or entire servers
Rewrite, redirect, or inject errors
https://httptoolkit.tech/android
Mock endpoints or entire servers
Rewrite, redirect, or inject errors
https://httptoolkit.tech/android
Httptoolkit
Intercept, mock & debug Android HTTP traffic
HTTP Toolkit includes built-in automatic setup and advanced support for Android, so you can debug and modify any HTTP(S) traffic in seconds.
Clipboard Toast
An Xposed module that notifies you whenever an app reads your clipboard
https://github.com/ubuntuegor/ClipboardToast
An Xposed module that notifies you whenever an app reads your clipboard
https://github.com/ubuntuegor/ClipboardToast
GitHub
GitHub - ubuntuegor/ClipboardToast: Clipboard access notification inspired by iOS 14
Clipboard access notification inspired by iOS 14. Contribute to ubuntuegor/ClipboardToast development by creating an account on GitHub.
Package visibility in Android 11 #ForDevelopers
https://medium.com/androiddevelopers/package-visibility-in-android-11-cc857f221cd9
https://medium.com/androiddevelopers/package-visibility-in-android-11-cc857f221cd9
Medium
Package visibility in Android 11
On Android 10 and earlier, apps could query the full list of installed apps on the system using methods like queryIntentActivities. In…
Android FakeSpy analysis | Roaming Mantis
https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world
https://www.cybereason.com/blog/fakespy-masquerades-as-postal-service-apps-around-the-world
Cybereason
FakeSpy Masquerades as Postal Service Apps Around the World
The Cybereason Nocturnus team is investigating a new campaign involving FakeSpy, an Android mobile malware used to steal SMS messages, send SMS messages, steal financial data, read account information and contact lists, steal application data, and do much…