Hey Team, can u share again WhatsApp community grp link?
@marathishivanclass2973 ай бұрын
nice how i can enroll is there any subscription charges?
@x.plorer3 ай бұрын
guy didn't even care to put it in slideshow mode 😑
@Stish8343 ай бұрын
What a great session. Thankyou . One more thing can you share the pocs which are demonstrated in this video.
@MohanBhargav-u9h4 ай бұрын
Great explanation of root what and where Malware attack in android. Unlike most yt vids this helps us to think how everything works. @payatu i would love to have more content like this
@th3hood4 ай бұрын
Great content and Nice explanation of the source code review for analyzing malware in Android.
@floringogoseanu26904 ай бұрын
Great content with poor sound quality.
@ariadesupriyatna4 ай бұрын
👍
@anuragpal90854 ай бұрын
Great resource to get started for Android malware analysis
@adilhashmi76085 ай бұрын
please provide the link for the smali chellenges apk
@payatu5 ай бұрын
The smali challenges application that was used for demonstration in the webinar is not publicly available. We will be introducing smali patching challenges in the future releases of Payatu’s BugBazaar Android application. As of now, you can attempt to tackle the smali patching challenge in another publicly available vulnerable app for Android - allsafe (github.com/t0thkr1s/allsafe). You can also take up the challenge of writing a small application of your own in Android Studio and then attempt to patch and rebuild that application’s smali code. The following blog can serve as a guide to help you navigate this task. payatu.com/blog/an-introduction-to-smali/
@x.plorer5 ай бұрын
Mr. Basically
@newuser24746 ай бұрын
If all vulnerabilities are tested in rooted device but in real world almost everyone has non rooted device so how these attacks are feasible in real world scenarios
@payatu5 ай бұрын
Your question about requirement for rooted device for testing vulnerabilities is quite broad, however I will try to address it using examples covered in the video. A rooted device with all the necessary utilities and attack frameworks is an attacker’s preferred tool/setup for pentesting an application. Pentesters require root access to evaluate the application’s security. This access is required for bypassing certificate pinning, necessary for intercepting HTTP communication between the app and a remote server. Root access is also vital for examining security best practices like secure data storage and secrets handling practices. Dynamic instrumentation (runtime manipulation) tools like frida also require device root access for utilization of the tool’s full capability and features. However, not all vulnerabilities require a rooted device to be tested. The vulnerabilities that are discovered are classified according to severity, context and the feasibility of exploitation. The target of vulnerabilities is either the application itself (code, server and other infra) or the application’s users. Usually, when something is classified as a vulnerability - a scenario of exploitation is demonstrated or the security risk is highlighted. For example, the pincode bypass attack demonstrated in the video was attempted on a rooted device and a dynamic instrumentation/runtime manipulation tool (frida) was used to alter a specific block of the application’s code at runtime. The exploitation of this particular vulnerability will not be possible without the attacker having physical access to the victim’s device. Runtime manipulation is can still be attempted with physical access to the victim’s non-rooted device using a tool like frida-gadget (mas.owasp.org/MASTG/techniques/android/MASTG-TECH-0026/). Although the severity of this vulnerability will be adjusted according to the likelihood of exploitation, which is low in this scenario and the impact is limited because physical access to the victim’s device is required. The primary flaw here is that the application is not secured against runtime manipulation and the impact would allow an attacker to bypass the logic of the pin-based authentication. In another example, a scenario was demonstrated where a deep link can be crafted that triggers an unsafe state-changing action during it’s handling and leads to a vulnerability. In this case, the victim/target is another user of the vulnerable application and whether the attack is delivered to the victim user via a rooted or non-rooted device is irrelevant. Successful exploitation can be achieved by crafting the exploit (deep link) and delivering it to the victim’s device via a phishing page/social messenger/email and for the victim to click on that deep link. I hope this information helped clarify your doubts to an extent about the role of rooted and non-rooted devices in testing android application vulnerabilities.
@newuser24745 ай бұрын
@@payatu hi thanks! For the detailed explanation. To some extent it clarifies my doubt. I will research more on this. Thank you once again.
@mcnekss49046 ай бұрын
Nice ! u have any groupchat or any platform so i can catch any updates
@payatu6 ай бұрын
Hello! For frequent updates and more cybersecurity content like this join our exclusive Cybersecurity WhatsApp community: ➡️ chat.whatsapp.com/GRRfW8wcd1gJqimor8dcMI
@harishvanjari5266 ай бұрын
Hi nandha Kumar, you remember me ? Your ex-colleague from AKS. It was a nice webinar 👍👍👍
@15494063y7 ай бұрын
not able to access whatsapp group it is showing group full
@payatu6 ай бұрын
Hello! We're sorry to hear about the issue. Please use the link below: ➡️ chat.whatsapp.com/GRRfW8wcd1gJqimor8dcMI
@lorinlivick38008 ай бұрын
Promo_SM
@saadb26709 ай бұрын
Nice course.
@kasperskyhackfi10 ай бұрын
Very fruitful!
@sureshsharma5310 ай бұрын
Nice work very informative
@narendradhande3012 Жыл бұрын
हिंदी मे व्हिडिओ रहेगा, तो जादा लोगोके काम आयेगा
@x.plorer Жыл бұрын
Putting memes when you have no hold on the language, 👏
@DigitalTrendzy2023 Жыл бұрын
As one of your researcher shown buffer overflow in small code in Android can you perform same on ipa file
@DigitalTrendzy2023 Жыл бұрын
what are use cases for reverse engineering for ipa file only
@L3ster_ Жыл бұрын
Why didn’t you post the pdf tho
@namandevnani9648 Жыл бұрын
Amazing 🤩
@AlexTran-xc5ih Жыл бұрын
Thanks for sharing!
@namandevnani9648 Жыл бұрын
Can i get exploit writing 101 webinar recording please i think it got removed from the youtube ..
@payatu Жыл бұрын
Hello. The Webinar is now live: kzbin.info/www/bejne/pGjOpmmPjMqdaqc Subscribe to the channel for all the latest videos and join our WhatsApp community to get filtered updates handpicked by experts directly to your WhatsApp. Thank you.
@namandevnani9648 Жыл бұрын
@@payatu Thank You Very Much ❤️
@shankaracharya3357 Жыл бұрын
Pdf ?
@iphones1941 Жыл бұрын
plz i went to Manual_SCR_of_WP_Plugins.pdf
@smithsteyn2428 Жыл бұрын
Informative video
@user-ko7oo2qg1g Жыл бұрын
Hire me please
@payatu Жыл бұрын
Hi. Please visit the below link to check our open positions: payatu.com/career/ You can email us at [email protected]. Thank you.
@Rambo-cm3wy Жыл бұрын
Class dump swift showing md5 and sha1 In app binaries , is that a vulnerability
@decoder6878 Жыл бұрын
I'd love to join. I'm having skills only in windows malware development, AV evasion and AD pentesting. Yet to learn IOT and hardware pentesting.
@baanuprathapreddy8234 Жыл бұрын
what is the emulator name you have used?
@jessblair37 Жыл бұрын
A+!!! Want subs? -> promo sm!
@dhirajsutar69032 жыл бұрын
🤩🤩🤩
@karansuryawanshi49722 жыл бұрын
How often these vulnerabilities are found? As google does a scanning of application for such vulnerabilities before it is published.
@rohitdeswal12242 жыл бұрын
Google can't detect complicated code
@the58th2 жыл бұрын
Good one. Lot of interesting resources.
@niketsingh77162 жыл бұрын
Interesting insights
@babayaga98053 жыл бұрын
Learn how to google😂😂i have that skill
@marygallagher38313 жыл бұрын
b58zh vur.fyi
@satishchhatpar3 жыл бұрын
Thanks for sharing Payatu and Arjun Singh.
@niraj92263 жыл бұрын
Thank you
@kumarniloy17983 жыл бұрын
Best books for Android hacking or how to start Android os penetration i found a lot of video on youtube but everything is not good quality
@kwsa66043 жыл бұрын
Do you have now? if you have tell me pls
@kwsa66042 жыл бұрын
Android hackers handbook is good book
@SDRplayRSP3 жыл бұрын
Nice presentation... by the way there are GNU radio source blocks for the SDRplay RSP family of SDR receivers. Technical support from www.radiojitter.com/product/sdrplay-radio-spectrum-processor-rsp1a/