OWASP Top 10: Static Analysis of Android Application & Tools Used
https://blog.securelayer7.net/static-analysis-of-android-application-tools-used-securelayer7/
~ @geekcode ❤️
https://blog.securelayer7.net/static-analysis-of-android-application-tools-used-securelayer7/
~ @geekcode ❤️
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Mitigate OWASP Top 10 Android Risks with Static Analysis
With the widespread use of mobile applications and the growing concern for mobile app security, it has become crucial for developers to ensure the integrity and security of their Android...
What is a Fake Access Point(AP)?
A fake AP is an AP that looks normal to users and doesn't have encryption on it, so people can connect without having to enter a key. It's an open network, and it should have an internet connection to attract people to it.
Why would we create a fake Access Point? Well, if we create one, we will attract a large number of people to connect to the network and access the internet. They will log in to their accounts, and we can use packet sniffing to capture anything that they log.
If you guys have any query drop your query here @geekserverbot
~ @geekcode ❤️
A fake AP is an AP that looks normal to users and doesn't have encryption on it, so people can connect without having to enter a key. It's an open network, and it should have an internet connection to attract people to it.
Why would we create a fake Access Point? Well, if we create one, we will attract a large number of people to connect to the network and access the internet. They will log in to their accounts, and we can use packet sniffing to capture anything that they log.
If you guys have any query drop your query here @geekserverbot
~ @geekcode ❤️
What is Packet Sniffing?
Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network. In this way, every packet, or a defined subset of packets, may be gathered, stored and analyzed in order to better understand exactly what data is being sent across a given network.
Packet sniffing is a valuable tool for monitoring the performance of a network and diagnosing issues.
If you guys have any query drop your query here @geekserverbot
~ @geekcode
Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network. In this way, every packet, or a defined subset of packets, may be gathered, stored and analyzed in order to better understand exactly what data is being sent across a given network.
Packet sniffing is a valuable tool for monitoring the performance of a network and diagnosing issues.
If you guys have any query drop your query here @geekserverbot
~ @geekcode
Forwarded from Cyber Agents
Google will make Android apps tell users about data collection
https://www.straitstimes.com/tech/tech-news/google-will-make-android-apps-tell-users-about-data-collection
@cyberagents
https://www.straitstimes.com/tech/tech-news/google-will-make-android-apps-tell-users-about-data-collection
@cyberagents
What is Domain Hijacking?
Domain hijacking is an attack whereby a threat actor takes control of a victim’s domain name.
Generally, domain names are hijacked by adversaries with the intent to steal customer data (or even steal customers), interrupt the trading of other businesses.One of the most high-profile recent examples of this type of attack occurred when the perl.com domain was hijacked.
Most domain hijacking attacks happen when an attacker gathers personal information about the domain owner and uses this information to impersonate the owner to the domain registrar, convincing them to modify the registration information. It can also happen when domain owner email addresses are compromised, or in conjunction with phishing attacks.
If you guys have any query drop here @geekserverbot
~ @geekcode
Domain hijacking is an attack whereby a threat actor takes control of a victim’s domain name.
Generally, domain names are hijacked by adversaries with the intent to steal customer data (or even steal customers), interrupt the trading of other businesses.One of the most high-profile recent examples of this type of attack occurred when the perl.com domain was hijacked.
Most domain hijacking attacks happen when an attacker gathers personal information about the domain owner and uses this information to impersonate the owner to the domain registrar, convincing them to modify the registration information. It can also happen when domain owner email addresses are compromised, or in conjunction with phishing attacks.
If you guys have any query drop here @geekserverbot
~ @geekcode
Forwarded from Cyber Agents
Apple AirTag jailbroken already – hacked in rickroll attack
https://nakedsecurity.sophos.com/2021/05/11/apple-airtag-jailbroken-already-hacked-in-rickroll-attack/
@cyberagents X @geekcode
https://nakedsecurity.sophos.com/2021/05/11/apple-airtag-jailbroken-already-hacked-in-rickroll-attack/
@cyberagents X @geekcode