#android
Read more stories on Hashnode
Articles with this tag
Intercepting and Manipulating client-side AES encrypted traffic in mobile applications having hardcoded Key and IV ยท Overview Mobile applications are...
Introduction Task Hijacking is a vulnerability that affects the applications running on Android devices due to a misconfiguration in their...
Android app Pentests can become torturous when you don't have the right environment setup.This of course refers to the SSL-pinning that is implemented...
Everybody is familiar with what an XSS is so fast-forwarding it a bit, this is a write-up on how I managed to get an XSS in a PDF generator on an...
TL;DRWe exploited an information disclosure in the mobile app to get an RCE on an internal server which was leveraged to the prod environment. Let's...
This post contains a list of commands which can be used with Drozer, a tool for pentesting Android applications.All of the commands have been taken...