Mobile

My recent interest arise in Mobile hacking, specially in mobile binary exploitation which usually people don't talk about, or maybe because of the limitation of application or developers who don't prefer to write the application on C, in this new sectoin of blog I will focus on Android/IOS based application and binary exploitation.

Android

So while solving DIVA application, I encouter a serious challange in the last part of the application which is BOF, which KNX named it as a Binary from hell πŸ˜‚, for more details follow the blog below πŸ˜‚.
0) Environment setup
1) Insecure Logging
2) Hardcoding Issues – Part 1
3) Insecure Data Storage – Part 1
4) Insecure Data Storage – Part 2
5) Insecure Data Storage – Part 3
6) Insecure Data Storage – Part 4
7) Input Validation Issues – Part 1
8) Input Validation Issues – Part 2
9) Access Control Issues – Part 1
10) Access Control Issues – Part 2
11) Access Control Issues – Part 3
12) Hardcoding Issues – Part 2
13) Input Validation Issues – Part 3
14) Binary From Hell 😈

~ tavşanı sever

Twitter / Hack The Box / CTF Team / Teck_N00bs Community Telegram