Interesting network traffic interception method. Should work for Xamarin and Dart made apps.
Smartphone (OpenVPN) -> VPN server -redirection-> BurpSuite
https://bhavukjain.com/blog/2023/02/19/capturing-requests-non-proxy-aware-application
Smartphone (OpenVPN) -> VPN server -redirection-> BurpSuite
https://bhavukjain.com/blog/2023/02/19/capturing-requests-non-proxy-aware-application
Bhavukjain
Capturing HTTP Requests from a non-proxy-aware Mobile Application | bhavukjain1
UPDATE - This post has been updated to include a stable set of NAT rules for iptables. Mobile applications are becoming increasinglyโฆ
๐11โค1โก1
Finding backup vulnerabilities in Android apps
โ android:allowBackup="true"
https://medium.com/@vishwaraj101/finding-backup-vulnerabilities-in-android-apps-6b87330f97b3
โ android:allowBackup="true"
https://medium.com/@vishwaraj101/finding-backup-vulnerabilities-in-android-apps-6b87330f97b3
Medium
Finding backup vulnerabilities in android apps
Hi everyone this post is just an elaboration of the 10th point that I made it in my previous post which is being often missed byโฆ
๐13โค4๐ค2
Interesting Android CTFs collection
https://github.com/r0ysue/MobileCTF
https://github.com/r0ysue/MobileCTF
GitHub
GitHub - r0ysue/MobileCTF: ไฝ็ณปๅใๅฎๆๅใstep by stepใ็ฎๆ ๆธ
ๆฐไธๅ
ทไฝ็ไธไธชๆๆชๅ็บงใๆ้ฟ่ทฏๅพ่งๅๅพ
ไฝ็ณปๅใๅฎๆๅใstep by stepใ็ฎๆ ๆธ
ๆฐไธๅ
ทไฝ็ไธไธชๆๆชๅ็บงใๆ้ฟ่ทฏๅพ่งๅๅพ. Contribute to r0ysue/MobileCTF development by creating an account on GitHub.
๐ฅ13๐2
Extracting User Locations by Analyzing SMS Timings
https://arxiv.org/abs/2306.07695
https://arxiv.org/abs/2306.07695
๐ฅ12๐2
Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices
https://mrbypass.medium.com/assessing-security-risks-of-local-storage-on-non-jailbroken-ios-devices-8d303ebe0e77
https://mrbypass.medium.com/assessing-security-risks-of-local-storage-on-non-jailbroken-ios-devices-8d303ebe0e77
Medium
Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices
Hello everyone, while doing iOS application penetration testing you may have come across a situation where you donโt have the jailbrokenโฆ
๐ฅ11๐4
Exploring Frida & Objection on Non-Jailbroken Devices without Application Patching
https://mrbypass.medium.com/unlocking-potential-exploring-frida-objection-on-non-jailbroken-devices-without-application-ed0367a84f07
https://mrbypass.medium.com/unlocking-potential-exploring-frida-objection-on-non-jailbroken-devices-without-application-ed0367a84f07
Medium
Unlocking Potential: Exploring Frida & Objection on Non-Jailbroken Devices without Applicationโฆ
As we saw in the previous article Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices that how we can install theโฆ
๐20
Invisible Adware: Unveiling Ad Fraud Targeting Korean Android Users
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/invisible-adware-unveiling-ad-fraud-targeting-korean-android-users/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/invisible-adware-unveiling-ad-fraud-targeting-korean-android-users/
McAfee Blog
Invisible Adware: Unveiling Ad Fraud Targeting Android Users | McAfee Blog
Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it's no surprise that users are becoming
๐7๐ฅ1๐1๐ค1
NetHunter Hacker VI:
How to setup HID & Rubber Ducky attacks with and without NetHunter, run PowerShell scripts, and intercept network traffic with BadUSB MITM setup
https://www.mobile-hacker.com/2023/08/08/nethunter-hacker-vi-ultimate-guide-to-hid-attacks-using-rubber-ducky-scripts-and-bad-usb-mitm-attack/
How to setup HID & Rubber Ducky attacks with and without NetHunter, run PowerShell scripts, and intercept network traffic with BadUSB MITM setup
https://www.mobile-hacker.com/2023/08/08/nethunter-hacker-vi-ultimate-guide-to-hid-attacks-using-rubber-ducky-scripts-and-bad-usb-mitm-attack/
Mobile Hacker
NetHunter Hacker VI: Ultimate guide to HID attacks using Rubber Ducky scripts and Bad USB MITM attack Mobile Hacker
Have you ever wondered how hackers can compromise a computer with just a USB device? In this blogpost, we will explore the concept of HID attacks, which are a type of physical host attack that use a programmable device to emulate a keyboard or mouse and executeโฆ
๐16โค1๐ฅ1
Uncovering an Iranian mobile malware campaign
https://news.sophos.com/en-us/2023/07/27/uncovering-an-iranian-mobile-malware-campaign/
https://news.sophos.com/en-us/2023/07/27/uncovering-an-iranian-mobile-malware-campaign/
Sophos News
Uncovering an Iranian mobile malware campaign
Sophos X-Ops researchers discover a cluster of credential-harvesting apps targeting Iranian bank customers
๐ฅ9๐5๐ค1
ZygiskFrida: zygisk module injects Frida gadget in Android apps in a stealthy way
-It is not embedded into the APK itself. APK Integrity/Signature checks will pass
-Avoiding ptrace based detection
-Allows to load multiple libraries into the process
https://github.com/lico-n/ZygiskFrida
-It is not embedded into the APK itself. APK Integrity/Signature checks will pass
-Avoiding ptrace based detection
-Allows to load multiple libraries into the process
https://github.com/lico-n/ZygiskFrida
GitHub
GitHub - lico-n/ZygiskFrida: Injects frida gadget using zygisk to bypass anti-tamper checks.
Injects frida gadget using zygisk to bypass anti-tamper checks. - lico-n/ZygiskFrida
๐19โค3๐2
Popular Chinese keyboard app (Sogou Keyboard) transmits every typed key to their server (Windows, Android, iOS).
On top of that, it contains vulnerabilities in encryption that expose user keypresses to network eavesdropping (MITM)
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
On top of that, it contains vulnerabilities in encryption that expose user keypresses to network eavesdropping (MITM)
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
The Citizen Lab
โPlease do not make it publicโ
In this report, we analyze the Windows, Android, and iOS versions of Tencentโs Sogou Input Method, the most popular Chinese-language input method in China. Our analysis found serious vulnerabilities in the appโs custom encryption system and how it encryptsโฆ
๐10๐คฌ5๐1
Exploiting LPE on Google Pixel 7 running Android 13
The Art of Rooting Android devices by GPU MMU features.
Slides: https://i.blackhat.com/BH-US-23/Presentations/US-23-WANG-The-Art-of-Rooting-Android-devices-by-GPU-MMU-features.pdf
Demo: https://youtu.be/D_AMrLbo3v8
The Art of Rooting Android devices by GPU MMU features.
Slides: https://i.blackhat.com/BH-US-23/Presentations/US-23-WANG-The-Art-of-Rooting-Android-devices-by-GPU-MMU-features.pdf
Demo: https://youtu.be/D_AMrLbo3v8
๐19๐2
ARTful: A library for dynamically modifying the Android Runtime
https://github.com/LaurieWired/ARTful
https://github.com/LaurieWired/ARTful
GitHub
GitHub - LaurieWired/ARTful: The ARTful library for dynamically modifying the Android Runtime
The ARTful library for dynamically modifying the Android Runtime - LaurieWired/ARTful
๐ฅ11๐5โค4
Katalina - new tool that executes Android byte code, enabling to deobfuscate strings in Android malware
Itโs written in Python and emulates each individual bytecode instruction that was used back in the day for Android
https://github.com/huuck/Katalina
https://www.humansecurity.com/tech-engineering-blog/katalina-an-open-source-android-string-deobfuscator
Itโs written in Python and emulates each individual bytecode instruction that was used back in the day for Android
https://github.com/huuck/Katalina
https://www.humansecurity.com/tech-engineering-blog/katalina-an-open-source-android-string-deobfuscator
GitHub
GitHub - huuck/Katalina: Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Androidโฆ
Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time. - huuck/Katalina
๐ฅ16๐10โค3
PoC how to trigger Remote Code Execution in Over-the-Air attack targeting Google Pixel 6
Victim perspective: Connect to attacker's fake base station -> receive call -> PWND!
Demo: https://youtu.be/R-XXpG_mZZI
Slides: https://i.blackhat.com/BH-US-23/Presentations/US-23-Karimi-Over-the-Air-Under-the-Radar.pdf
Victim perspective: Connect to attacker's fake base station -> receive call -> PWND!
Demo: https://youtu.be/R-XXpG_mZZI
Slides: https://i.blackhat.com/BH-US-23/Presentations/US-23-Karimi-Over-the-Air-Under-the-Radar.pdf
YouTube
Android Red Team: Over the Air, Under the Radar. Attacking and Securing the Pixel Modem
๐ฑ14๐4๐ฅ2
Android Data Encryption in depth
https://blog.quarkslab.com/android-data-encryption-in-depth.html
https://blog.quarkslab.com/android-data-encryption-in-depth.html
Quarkslab
Android Data Encryption in depth - Quarkslab's blog
Join us in our journey into modern Android's Data Encryption at rest, in which we study how it works and assess how resistant it is against attackers having access to a range of high end software vulnerabilities.
๐13
NetHunter Hacker VII: Wi-Fi compatibility check and setup on Android
https://www.mobile-hacker.com/2023/08/15/nethunter-hacker-vii-wi-fi-compatibility-check-and-setup-on-android/
https://www.mobile-hacker.com/2023/08/15/nethunter-hacker-vii-wi-fi-compatibility-check-and-setup-on-android/
Mobile Hacker
NetHunter Hacker VII: Wi-Fi compatibility check and setup on Android Mobile Hacker
If you are interested in Wi-Fi hacking using NetHunter, you need to have a supported Wi-Fi adapter by your system that can supports various wireless modes and features. In this blogpost, we will explain what the different types of Wi-Fi adapters are, howโฆ
๐14โค2๐ค1
Breaking down Android Gigabud banking malware
https://www.group-ib.com/blog/gigabud-banking-malware/
https://www.group-ib.com/blog/gigabud-banking-malware/
Group-IB
Breaking down Gigabud banking malware with Fraud Matrix | Group-IB Blog
Uncover the disruptive nature of Gigabud malware and take proactive measures to mitigate the associated risks
๐10๐3
Mobile Malware Analysis Part 1 โ Leveraging Accessibility Features To Steal Crypto Wallet
https://8ksec.io/mobile-malware-analysis-part-1-crypto-wallet-stealer/
https://8ksec.io/mobile-malware-analysis-part-1-crypto-wallet-stealer/
๐14
Forwarded from The Bug Bounty Hunter
Making Chrome more secure by bringing Key Pinning to Android
http://security.googleblog.com/2023/08/making-chrome-more-secure-by-bringing.html
http://security.googleblog.com/2023/08/making-chrome-more-secure-by-bringing.html
Google Online Security Blog
Making Chrome more secure by bringing Key Pinning to Android
Posted by David Adrian, Joe DeBlasio and Carlos Joan Rafael Ibarra Lopez, Chrome Security Chrome 106 added support for enforcing key pins...
๐9โค3๐1๐ค1
Over 3,000 Android Malware Samples Using Multiple Techniques to Bypass Detection
https://www.zimperium.com/blog/over-3000-android-malware-samples-using-multiple-techniques-to-bypass-detection/
https://www.zimperium.com/blog/over-3000-android-malware-samples-using-multiple-techniques-to-bypass-detection/
Zimperium
Unsupported Compression Methods Enable Android Malware to Bypass Detection
true
๐16๐ค3