Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ One UI 6 Watch: A Significant Upgrade for #Galaxy Watch 4 Series
https://undercodenews.com/one-ui-6-watch-a-significant-upgrade-for-galaxy-watch-4-series/
@Undercode_News
https://undercodenews.com/one-ui-6-watch-a-significant-upgrade-for-galaxy-watch-4-series/
@Undercode_News
UNDERCODE NEWS
One UI 6 Watch: A Significant Upgrade for Galaxy Watch 4 Series - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔐 Crafting a Strong Password Policy: A Practical Guide
https://undercodenews.com/crafting-a-strong-password-policy-a-practical-guide/
@Undercode_News
https://undercodenews.com/crafting-a-strong-password-policy-a-practical-guide/
@Undercode_News
UNDERCODE NEWS
Crafting a Strong Password Policy: A Practical Guide - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔋 Realme GT 6: A Powerful Contender in the Mid-Range Segment
https://undercodenews.com/realme-gt-6-a-powerful-contender-in-the-mid-range-segment/
@Undercode_News
https://undercodenews.com/realme-gt-6-a-powerful-contender-in-the-mid-range-segment/
@Undercode_News
UNDERCODE NEWS
Realme GT 6: A Powerful Contender in the Mid-Range Segment - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ #AI Security Scanner Hype: FTC Calls Out Evolv
https://undercodenews.com/ai-security-scanner-hype-ftc-calls-out-evolv/
@Undercode_News
https://undercodenews.com/ai-security-scanner-hype-ftc-calls-out-evolv/
@Undercode_News
UNDERCODE NEWS
AI Security Scanner Hype: FTC Calls Out Evolv - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🖥️ OnePlus Devices: Exciting Deals and Offers
https://undercodenews.com/oneplus-devices-exciting-deals-and-offers/
@Undercode_News
https://undercodenews.com/oneplus-devices-exciting-deals-and-offers/
@Undercode_News
UNDERCODE NEWS
OnePlus Devices: Exciting Deals and Offers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Level Up Your Chess Game: GoChess Mini - #AI Coach in a Board
https://undercodenews.com/level-up-your-chess-game-gochess-mini-ai-coach-in-a-board/
@Undercode_News
https://undercodenews.com/level-up-your-chess-game-gochess-mini-ai-coach-in-a-board/
@Undercode_News
UNDERCODE NEWS
Level Up Your Chess Game: GoChess Mini - AI Coach in a Board - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple to Invest Billion in Indonesia to Resume #iPhone 16 Sales
https://undercodenews.com/apple-to-invest-billion-in-indonesia-to-resume-iphone-16-sales/
@Undercode_News
https://undercodenews.com/apple-to-invest-billion-in-indonesia-to-resume-iphone-16-sales/
@Undercode_News
UNDERCODE NEWS
Apple to Invest Billion in Indonesia to Resume iPhone 16 Sales - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Amazon Unveils New #AI Foundation Models to Rival Tech Giants
https://undercodenews.com/amazon-unveils-new-ai-foundation-models-to-rival-tech-giants/
@Undercode_News
https://undercodenews.com/amazon-unveils-new-ai-foundation-models-to-rival-tech-giants/
@Undercode_News
UNDERCODE NEWS
Amazon Unveils New AI Foundation Models to Rival Tech Giants - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #WhatsApp Beta for #iOS 24241078: A Closer Look at Synced Chat History
https://undercodenews.com/whatsapp-beta-for-ios-24241078-a-closer-look-at-synced-chat-history/
@Undercode_News
https://undercodenews.com/whatsapp-beta-for-ios-24241078-a-closer-look-at-synced-chat-history/
@Undercode_News
UNDERCODE NEWS
WhatsApp Beta for iOS 24241078: A Closer Look at Synced Chat History - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🔒 Unlock Your Dream Home with EPF Withdrawal: A Step-by-Step Guide
https://undercodenews.com/unlock-your-dream-home-with-epf-withdrawal-a-step-by-step-guide/
@Undercode_News
https://undercodenews.com/unlock-your-dream-home-with-epf-withdrawal-a-step-by-step-guide/
@Undercode_News
UNDERCODE NEWS
Unlock Your Dream Home with EPF Withdrawal: A Step-by-Step Guide - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Navigating the #AI Revolution: 5 Key Strategies for Business Success
https://undercodenews.com/navigating-the-ai-revolution-5-key-strategies-for-business-success/
@Undercode_News
https://undercodenews.com/navigating-the-ai-revolution-5-key-strategies-for-business-success/
@Undercode_News
UNDERCODE NEWS
Navigating the AI Revolution: 5 Key Strategies for Business Success - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Intel's Leadership Shakeup: A Search for a New Era
https://undercodenews.com/intels-leadership-shakeup-a-search-for-a-new-era/
@Undercode_News
https://undercodenews.com/intels-leadership-shakeup-a-search-for-a-new-era/
@Undercode_News
UNDERCODE NEWS
Intel's Leadership Shakeup: A Search for a New Era - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple's Delayed HomePod with Display: A Closer Look
https://undercodenews.com/apples-delayed-homepod-with-display-a-closer-look/
@Undercode_News
https://undercodenews.com/apples-delayed-homepod-with-display-a-closer-look/
@Undercode_News
UNDERCODE NEWS
Apple's Delayed HomePod with Display: A Closer Look - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🌐 Cracking Down on Criminal Crypts: Europol Disrupts MATRIX and Germany Shuts Down Crimenetwork
https://undercodenews.com/cracking-down-on-criminal-crypts-europol-disrupts-matrix-and-germany-shuts-down-crimenetwork/
@Undercode_News
https://undercodenews.com/cracking-down-on-criminal-crypts-europol-disrupts-matrix-and-germany-shuts-down-crimenetwork/
@Undercode_News
UNDERCODE NEWS
Cracking Down on Criminal Crypts: Europol Disrupts MATRIX and Germany Shuts Down Crimenetwork - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ #Gemini Gets a Power-Up: New Utilities Extension Brings Enhanced On-Device Control
https://undercodenews.com/gemini-gets-a-power-up-new-utilities-extension-brings-enhanced-on-device-control/
@Undercode_News
https://undercodenews.com/gemini-gets-a-power-up-new-utilities-extension-brings-enhanced-on-device-control/
@Undercode_News
UNDERCODE NEWS
Gemini Gets a Power-Up: New Utilities Extension Brings Enhanced On-Device Control - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 Your Year in Music: #Spotify Wrapped Gets an #AI Makeover
https://undercodenews.com/your-year-in-music-spotify-wrapped-gets-an-ai-makeover/
@Undercode_News
https://undercodenews.com/your-year-in-music-spotify-wrapped-gets-an-ai-makeover/
@Undercode_News
UNDERCODE NEWS
Your Year in Music: Spotify Wrapped Gets an AI Makeover - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
#######
Mobile
Hacking
#######
Mobile
Hacking
#######
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Drozer is a security assessment framework for Android apps, developed by MWR InfoSecurity (now part of F-Secure). It's used by penetration testers to assess Android applications for vulnerabilities. Here's a hacking tutorial for using Drozer to identify vulnerabilities in Android apps.
---
## Prerequisites
1. Install Drozer:
Drozer consists of two components:
- Agent (installed on the Android device)
- Console (run on your host machine)
Download the Drozer agent APK from [official GitHub](https://github.com/FSecureLABS/drozer) and install it on your Android device. Install the Drozer console using:
2. Setup ADB:
Install Android Debug Bridge (ADB) to connect your Android device to your computer.
3. Rooted Device (Optional but Recommended):
Drozer can operate on non-rooted devices but works best with root privileges.
4. Enable USB Debugging:
Go to Settings > Developer Options > USB Debugging on your Android device.
---
## Step 1: Setting Up the Environment
1. Connect the Android Device:
Use ADB to ensure your device is detected:
2. Forward the Drozer Port:
Drozer communicates with the agent over port 31415. Forward this port using ADB:
3. Start the Drozer Agent:
Launch the Drozer agent app on your Android device and click "Start Server".
4. Launch Drozer Console:
On your host machine, open the Drozer console:
---
## Step 2: Reconnaissance
Drozer has a modular design, with commands categorized into packages. Start by gathering basic information.
1. List Installed Packages:
2. Find Specific Apps:
Search for apps by keyword, e.g., for "vulnerable":
3. Get Detailed App Information:
Get information about an app, such as permissions and activities:
---
## Step 3: Exploit Common Vulnerabilities
Drozer can be used to test various vulnerabilities, including exported activities, insecure file storage, and SQL injection.
### 1. Test Exported Components
Exported components can be accessed by any app on the device. Drozer identifies and interacts with these components.
#### Activities:
List exported activities:
Launch an exported activity:
#### Services:
List exported services:
Interact with a service:
#### Content Providers:
Identify content providers and their permissions:
Query content providers for data:
### 2. SQL Injection
Test content providers for SQL injection by manipulating query inputs:
### 3. Insecure Data Storage
Check for sensitive data in app directories:
### 4. Check for Debuggable Apps
Some apps are left in debuggable mode, exposing them to reverse engineering:
---
## Step 4: Automation and Exploit Modules
### Use Drozer's built-in exploit modules:
1. Scan for Known Vulnerabilities:
2. Check for World-Readable Files:
---
## Step 5: Generate Reports
Keep logs of your findings for documentation:
---
---
## Prerequisites
1. Install Drozer:
Drozer consists of two components:
- Agent (installed on the Android device)
- Console (run on your host machine)
Download the Drozer agent APK from [official GitHub](https://github.com/FSecureLABS/drozer) and install it on your Android device. Install the Drozer console using:
sudo apt install python3-pip
pip3 install drozer
2. Setup ADB:
Install Android Debug Bridge (ADB) to connect your Android device to your computer.
sudo apt install adb
3. Rooted Device (Optional but Recommended):
Drozer can operate on non-rooted devices but works best with root privileges.
4. Enable USB Debugging:
Go to Settings > Developer Options > USB Debugging on your Android device.
---
## Step 1: Setting Up the Environment
1. Connect the Android Device:
Use ADB to ensure your device is detected:
adb devices
2. Forward the Drozer Port:
Drozer communicates with the agent over port 31415. Forward this port using ADB:
adb forward tcp:31415 tcp:31415
3. Start the Drozer Agent:
Launch the Drozer agent app on your Android device and click "Start Server".
4. Launch Drozer Console:
On your host machine, open the Drozer console:
drozer console connect
---
## Step 2: Reconnaissance
Drozer has a modular design, with commands categorized into packages. Start by gathering basic information.
1. List Installed Packages:
run app.package.list
2. Find Specific Apps:
Search for apps by keyword, e.g., for "vulnerable":
run app.package.list -f vulnerable
3. Get Detailed App Information:
Get information about an app, such as permissions and activities:
run app.package.info -a com.example.vulnerableapp
---
## Step 3: Exploit Common Vulnerabilities
Drozer can be used to test various vulnerabilities, including exported activities, insecure file storage, and SQL injection.
### 1. Test Exported Components
Exported components can be accessed by any app on the device. Drozer identifies and interacts with these components.
#### Activities:
List exported activities:
run app.activity.info -a com.example.vulnerableapp
Launch an exported activity:
run app.activity.start --component com.example.vulnerableapp com.example.vulnerableapp.MainActivity
#### Services:
List exported services:
run app.service.info -a com.example.vulnerableapp
Interact with a service:
run app.service.send --component com.example.vulnerableapp com.example.vulnerableapp.MyService
#### Content Providers:
Identify content providers and their permissions:
run app.provider.info -a com.example.vulnerableapp
Query content providers for data:
run app.provider.query content://com.example.vulnerableapp.provider/data
### 2. SQL Injection
Test content providers for SQL injection by manipulating query inputs:
run app.provider.query content://com.example.vulnerableapp.provider/data --projection "' OR '1'='1"
### 3. Insecure Data Storage
Check for sensitive data in app directories:
run scanner.misc.filebrowser -a com.example.vulnerableapp
### 4. Check for Debuggable Apps
Some apps are left in debuggable mode, exposing them to reverse engineering:
run app.package.debuggable
---
## Step 4: Automation and Exploit Modules
### Use Drozer's built-in exploit modules:
1. Scan for Known Vulnerabilities:
run scanner.provider.injection -a com.example.vulnerableapp
2. Check for World-Readable Files:
run scanner.misc.world_readable_files
---
## Step 5: Generate Reports
Keep logs of your findings for documentation:
drozer console connect > output.log
---
Forwarded from Exploiting Crew (Pr1vAt3)
### Note:
This tutorial is intended for educational purposes only. Testing applications without explicit permission is illegal and unethical. Always adhere to your organization's policies or get consent from app owners before performing assessments.
---
Let me know if you'd like help with specific Drozer commands or use cases!
This tutorial is intended for educational purposes only. Testing applications without explicit permission is illegal and unethical. Always adhere to your organization's policies or get consent from app owners before performing assessments.
---
Let me know if you'd like help with specific Drozer commands or use cases!
GitHub
GitHub - ReversecLabs/drozer: The Leading Security Assessment Framework for Android.
The Leading Security Assessment Framework for Android. - ReversecLabs/drozer
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Mobile Security Framework (MobSF) Hacking Tutorial
MobSF (Mobile Security Framework) is an open-source automated pen-testing framework used for analyzing Android, iOS, and Windows apps. It supports both static and dynamic analysis, making it an essential tool for app security assessments.
---
## Prerequisites
1. Install MobSF:
- Clone the MobSF repository:
- Install dependencies and start the server:
Access MobSF via
2. Java Environment:
Ensure Java is installed for decompiling Android APKs:
3. Dynamic Analysis (Optional):
For dynamic analysis, you'll need:
- A VirtualBox VM or a rooted Android device.
- Genymotion (Android emulator).
---
## Step 1: Static Analysis
Static analysis examines the app's source code for vulnerabilities.
### Analyze an APK
1. Upload the APK file:
Drag and drop the APK onto the MobSF web interface.
2. Wait for processing:
MobSF will decompile the APK and display a detailed report.
### Review the Report
The report is divided into sections:
1. App Information:
Includes package name, version, permissions, and components.
2. Permissions Analysis:
Flags excessive or dangerous permissions like
3. Manifest Analysis:
Examines the
- Exported activities, services, and receivers.
- Insecure configurations.
4. Code Analysis:
Identifies potential vulnerabilities in the app's source code:
- Hardcoded API keys
- Weak encryption
- Unprotected credentials
5. Cryptographic Analysis:
Highlights insecure cryptographic practices, e.g., MD5 or hardcoded keys.
---
## Step 2: Dynamic Analysis
Dynamic analysis evaluates the app's behavior during runtime.
### Set Up Dynamic Analysis
1. Configure Emulator/Device:
- Install the MobSF dynamic analysis APK on the device.
- Set up ADB forwarding:
2. Launch Dynamic Analysis:
Start the dynamic analysis module in MobSF and connect your device.
3. Monitor Runtime Behavior:
- Inspect API calls, file system access, and network traffic.
- Use MobSF's built-in proxy for traffic analysis.
---
## Step 3: Advanced Features
1. Binary Analysis:
MobSF can analyze binaries (.so files) for vulnerabilities.
2. Memory Dump Analysis:
Inspect memory dumps for sensitive information like passwords or keys.
3. Malware Analysis:
Identify malicious patterns in APKs:
- Suspicious API usage
- Embedded malware signatures
---
## Step 4: Automation with REST API
MobSF provides an API for automation. Here's how to analyze an APK using the API:
1. Start MobSF API Server:
Enable the API server in
2. Submit an APK:
3. Retrieve Results:
---
## Step 5: Report Findings
Export the analysis report in various formats (PDF, HTML, JSON) for documentation.
---
### Common Use Cases
1. Testing Exported Components:
- Identify insecure exported activities, services, or receivers.
2. Analyzing Network Security:
- Check for plaintext HTTP traffic.
- Identify hardcoded server IPs or API keys.
3. Hardcoded Credentials:
- MobSF flags sensitive information like passwords embedded in the code.
---
### Important Notes
1. This tutorial is for ethical purposes. Ensure you have permission to test the app.
2. Use MobSF as part of a comprehensive app security assessment strategy.
---
Let me know if you'd like to explore specific features of MobSF!
MobSF (Mobile Security Framework) is an open-source automated pen-testing framework used for analyzing Android, iOS, and Windows apps. It supports both static and dynamic analysis, making it an essential tool for app security assessments.
---
## Prerequisites
1. Install MobSF:
- Clone the MobSF repository:
git clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git
cd Mobile-Security-Framework-MobSF
- Install dependencies and start the server:
./setup.sh # For Linux/Mac
python3 -m pip install -r requirements.txt
python3 manage.py runserver
Access MobSF via
http://127.0.0.1:8000.2. Java Environment:
Ensure Java is installed for decompiling Android APKs:
sudo apt install openjdk-11-jdk
3. Dynamic Analysis (Optional):
For dynamic analysis, you'll need:
- A VirtualBox VM or a rooted Android device.
- Genymotion (Android emulator).
---
## Step 1: Static Analysis
Static analysis examines the app's source code for vulnerabilities.
### Analyze an APK
1. Upload the APK file:
Drag and drop the APK onto the MobSF web interface.
2. Wait for processing:
MobSF will decompile the APK and display a detailed report.
### Review the Report
The report is divided into sections:
1. App Information:
Includes package name, version, permissions, and components.
2. Permissions Analysis:
Flags excessive or dangerous permissions like
READ_SMS, WRITE_EXTERNAL_STORAGE, etc.3. Manifest Analysis:
Examines the
AndroidManifest.xml file for:- Exported activities, services, and receivers.
- Insecure configurations.
4. Code Analysis:
Identifies potential vulnerabilities in the app's source code:
- Hardcoded API keys
- Weak encryption
- Unprotected credentials
5. Cryptographic Analysis:
Highlights insecure cryptographic practices, e.g., MD5 or hardcoded keys.
---
## Step 2: Dynamic Analysis
Dynamic analysis evaluates the app's behavior during runtime.
### Set Up Dynamic Analysis
1. Configure Emulator/Device:
- Install the MobSF dynamic analysis APK on the device.
- Set up ADB forwarding:
adb forward tcp:5000 tcp:5000
2. Launch Dynamic Analysis:
Start the dynamic analysis module in MobSF and connect your device.
3. Monitor Runtime Behavior:
- Inspect API calls, file system access, and network traffic.
- Use MobSF's built-in proxy for traffic analysis.
---
## Step 3: Advanced Features
1. Binary Analysis:
MobSF can analyze binaries (.so files) for vulnerabilities.
2. Memory Dump Analysis:
Inspect memory dumps for sensitive information like passwords or keys.
3. Malware Analysis:
Identify malicious patterns in APKs:
- Suspicious API usage
- Embedded malware signatures
---
## Step 4: Automation with REST API
MobSF provides an API for automation. Here's how to analyze an APK using the API:
1. Start MobSF API Server:
Enable the API server in
settings.py.2. Submit an APK:
curl -F "file=@app.apk" http://127.0.0.1:8000/api/v1/upload -H "Authorization: <your_api_key>"
3. Retrieve Results:
curl http://127.0.0.1:8000/api/v1/report_json -H "Authorization: <your_api_key>"
---
## Step 5: Report Findings
Export the analysis report in various formats (PDF, HTML, JSON) for documentation.
---
### Common Use Cases
1. Testing Exported Components:
- Identify insecure exported activities, services, or receivers.
2. Analyzing Network Security:
- Check for plaintext HTTP traffic.
- Identify hardcoded server IPs or API keys.
3. Hardcoded Credentials:
- MobSF flags sensitive information like passwords embedded in the code.
---
### Important Notes
1. This tutorial is for ethical purposes. Ensure you have permission to test the app.
2. Use MobSF as part of a comprehensive app security assessment strategy.
---
Let me know if you'd like to explore specific features of MobSF!