Android Security & Malware
43.3K subscribers
127 photos
20 videos
7 files
2.7K links
Mobile cybersecurity channel
Links: https://linktr.ee/mobilehacker
Contact: [email protected]
Download Telegram
Write-up on 1-click Exploit in South Korea's KakaoTalk mobile chat app allowed to steal access token and remotely exfiltrate all chat messages.
Issue is fixed, but the bug reporter haven't received reward, because only Koreans are eligible to receive bounty
https://stulle123.github.io/posts/kakaotalk-account-takeover/
๐Ÿ˜ข28โค7๐Ÿ”ฅ2๐Ÿ‘1๐Ÿคฌ1
SELinux bypasses
This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation
https://klecko.github.io/posts/selinux-bypasses/
โค29๐Ÿ”ฅ5๐Ÿ•Š1
This media is not supported in your browser
VIEW IN TELEGRAM
ShadyShader 2: An Apple bug that could freeze any device or cause crash loops by exploiting how GPUs handle shaders
Similar issue Apple patched last year (CVE-2023-40441)
https://www.imperva.com/blog/shadyshader-crashing-apple-m-series-with-single-click/
๐Ÿ”ฅ23โค2
Frida Script Runner - Versatile web-based tool designed for Android and iOS penetration testing purposes
https://github.com/z3n70/Frida-Script-Runner
๐Ÿ”ฅ26๐Ÿ‘5โค3
Nine writeup for some Android specific chromium behavior vulnerabilities
1) intent:// restrictions bypassed via firebase dynamic links (Fixed, Awarded $3000)
2) Bypass to issue 40060327 via market:// URL (Fixed, Awarded $2250)
3) Add to home screen spoof (Fixed, Awarded $1125)
4) Iframe sandbox allow-popups-to-escape-sandbox bypass via intent (Asked, Not fixed)
5) Controlling Google assistant (Asked, Not fixed)
6) Controlling Clock (Accepted, Not fixed)
7) URL Spoof via intent (Fixed, Awarded $3133.70)
8) BROWSABLE intent:// bypass (Fixed, Duplicate)
9) BROWSABLE intent:// bypass (Fixed, Awarded $4500.00)
https://ndevtk.github.io/writeups/2024/08/01/awas/
๐Ÿ‘14๐ŸŒš4โค3