Attacking AWS Cognito | Payatu Webinar
1:33:01
A Glimpse of Life at Payatu
1:37
Жыл бұрын
Пікірлер
@souravchakraborty3872
@souravchakraborty3872 Ай бұрын
Can you share the frida script which mentioned?
@Mayurrrr
@Mayurrrr 2 ай бұрын
Hey Team, can u share again WhatsApp community grp link?
@marathishivanclass297
@marathishivanclass297 3 ай бұрын
nice how i can enroll is there any subscription charges?
@x.plorer
@x.plorer 3 ай бұрын
guy didn't even care to put it in slideshow mode 😑
@Stish834
@Stish834 3 ай бұрын
What a great session. Thankyou . One more thing can you share the pocs which are demonstrated in this video.
@MohanBhargav-u9h
@MohanBhargav-u9h 4 ай бұрын
Great explanation of root what and where Malware attack in android. Unlike most yt vids this helps us to think how everything works. @payatu i would love to have more content like this
@th3hood
@th3hood 4 ай бұрын
Great content and Nice explanation of the source code review for analyzing malware in Android.
@floringogoseanu2690
@floringogoseanu2690 4 ай бұрын
Great content with poor sound quality.
@ariadesupriyatna
@ariadesupriyatna 4 ай бұрын
👍
@anuragpal9085
@anuragpal9085 4 ай бұрын
Great resource to get started for Android malware analysis
@adilhashmi7608
@adilhashmi7608 5 ай бұрын
please provide the link for the smali chellenges apk
@payatu
@payatu 5 ай бұрын
The smali challenges application that was used for demonstration in the webinar is not publicly available. We will be introducing smali patching challenges in the future releases of Payatu’s BugBazaar Android application. As of now, you can attempt to tackle the smali patching challenge in another publicly available vulnerable app for Android - allsafe (github.com/t0thkr1s/allsafe). You can also take up the challenge of writing a small application of your own in Android Studio and then attempt to patch and rebuild that application’s smali code. The following blog can serve as a guide to help you navigate this task. payatu.com/blog/an-introduction-to-smali/
@x.plorer
@x.plorer 5 ай бұрын
Mr. Basically
@newuser2474
@newuser2474 6 ай бұрын
If all vulnerabilities are tested in rooted device but in real world almost everyone has non rooted device so how these attacks are feasible in real world scenarios
@payatu
@payatu 5 ай бұрын
Your question about requirement for rooted device for testing vulnerabilities is quite broad, however I will try to address it using examples covered in the video. A rooted device with all the necessary utilities and attack frameworks is an attacker’s preferred tool/setup for pentesting an application. Pentesters require root access to evaluate the application’s security. This access is required for bypassing certificate pinning, necessary for intercepting HTTP communication between the app and a remote server. Root access is also vital for examining security best practices like secure data storage and secrets handling practices. Dynamic instrumentation (runtime manipulation) tools like frida also require device root access for utilization of the tool’s full capability and features. However, not all vulnerabilities require a rooted device to be tested. The vulnerabilities that are discovered are classified according to severity, context and the feasibility of exploitation. The target of vulnerabilities is either the application itself (code, server and other infra) or the application’s users. Usually, when something is classified as a vulnerability - a scenario of exploitation is demonstrated or the security risk is highlighted. For example, the pincode bypass attack demonstrated in the video was attempted on a rooted device and a dynamic instrumentation/runtime manipulation tool (frida) was used to alter a specific block of the application’s code at runtime. The exploitation of this particular vulnerability will not be possible without the attacker having physical access to the victim’s device. Runtime manipulation is can still be attempted with physical access to the victim’s non-rooted device using a tool like frida-gadget (mas.owasp.org/MASTG/techniques/android/MASTG-TECH-0026/). Although the severity of this vulnerability will be adjusted according to the likelihood of exploitation, which is low in this scenario and the impact is limited because physical access to the victim’s device is required. The primary flaw here is that the application is not secured against runtime manipulation and the impact would allow an attacker to bypass the logic of the pin-based authentication. In another example, a scenario was demonstrated where a deep link can be crafted that triggers an unsafe state-changing action during it’s handling and leads to a vulnerability. In this case, the victim/target is another user of the vulnerable application and whether the attack is delivered to the victim user via a rooted or non-rooted device is irrelevant. Successful exploitation can be achieved by crafting the exploit (deep link) and delivering it to the victim’s device via a phishing page/social messenger/email and for the victim to click on that deep link. I hope this information helped clarify your doubts to an extent about the role of rooted and non-rooted devices in testing android application vulnerabilities.
@newuser2474
@newuser2474 5 ай бұрын
@@payatu hi thanks! For the detailed explanation. To some extent it clarifies my doubt. I will research more on this. Thank you once again.
@mcnekss4904
@mcnekss4904 6 ай бұрын
Nice ! u have any groupchat or any platform so i can catch any updates
@payatu
@payatu 6 ай бұрын
Hello! For frequent updates and more cybersecurity content like this join our exclusive Cybersecurity WhatsApp community: ➡️ chat.whatsapp.com/GRRfW8wcd1gJqimor8dcMI
@harishvanjari526
@harishvanjari526 6 ай бұрын
Hi nandha Kumar, you remember me ? Your ex-colleague from AKS. It was a nice webinar 👍👍👍
@15494063y
@15494063y 7 ай бұрын
not able to access whatsapp group it is showing group full
@payatu
@payatu 6 ай бұрын
Hello! We're sorry to hear about the issue. Please use the link below: ➡️ chat.whatsapp.com/GRRfW8wcd1gJqimor8dcMI
@lorinlivick3800
@lorinlivick3800 8 ай бұрын
Promo_SM
@saadb2670
@saadb2670 9 ай бұрын
Nice course.
@kasperskyhackfi
@kasperskyhackfi 10 ай бұрын
Very fruitful!
@sureshsharma53
@sureshsharma53 10 ай бұрын
Nice work very informative
@narendradhande3012
@narendradhande3012 Жыл бұрын
हिंदी मे व्हिडिओ रहेगा, तो जादा लोगोके काम आयेगा
@x.plorer
@x.plorer Жыл бұрын
Putting memes when you have no hold on the language, 👏
@DigitalTrendzy2023
@DigitalTrendzy2023 Жыл бұрын
As one of your researcher shown buffer overflow in small code in Android can you perform same on ipa file
@DigitalTrendzy2023
@DigitalTrendzy2023 Жыл бұрын
what are use cases for reverse engineering for ipa file only
@L3ster_
@L3ster_ Жыл бұрын
Why didn’t you post the pdf tho
@namandevnani9648
@namandevnani9648 Жыл бұрын
Amazing 🤩
@AlexTran-xc5ih
@AlexTran-xc5ih Жыл бұрын
Thanks for sharing!
@namandevnani9648
@namandevnani9648 Жыл бұрын
Can i get exploit writing 101 webinar recording please i think it got removed from the youtube ..
@payatu
@payatu Жыл бұрын
Hello. The Webinar is now live: kzbin.info/www/bejne/pGjOpmmPjMqdaqc Subscribe to the channel for all the latest videos and join our WhatsApp community to get filtered updates handpicked by experts directly to your WhatsApp. Thank you.
@namandevnani9648
@namandevnani9648 Жыл бұрын
@@payatu Thank You Very Much ❤️
@shankaracharya3357
@shankaracharya3357 Жыл бұрын
Pdf ?
@iphones1941
@iphones1941 Жыл бұрын
plz i went to Manual_SCR_of_WP_Plugins.pdf
@smithsteyn2428
@smithsteyn2428 Жыл бұрын
Informative video
@user-ko7oo2qg1g
@user-ko7oo2qg1g Жыл бұрын
Hire me please
@payatu
@payatu Жыл бұрын
Hi. Please visit the below link to check our open positions: payatu.com/career/ You can email us at [email protected]. Thank you.
@Rambo-cm3wy
@Rambo-cm3wy Жыл бұрын
Class dump swift showing md5 and sha1 In app binaries , is that a vulnerability
@decoder6878
@decoder6878 Жыл бұрын
I'd love to join. I'm having skills only in windows malware development, AV evasion and AD pentesting. Yet to learn IOT and hardware pentesting.
@baanuprathapreddy8234
@baanuprathapreddy8234 Жыл бұрын
what is the emulator name you have used?
@jessblair37
@jessblair37 Жыл бұрын
A+!!! Want subs? -> promo sm!
@dhirajsutar6903
@dhirajsutar6903 2 жыл бұрын
🤩🤩🤩
@karansuryawanshi4972
@karansuryawanshi4972 2 жыл бұрын
How often these vulnerabilities are found? As google does a scanning of application for such vulnerabilities before it is published.
@rohitdeswal1224
@rohitdeswal1224 2 жыл бұрын
Google can't detect complicated code
@the58th
@the58th 2 жыл бұрын
Good one. Lot of interesting resources.
@niketsingh7716
@niketsingh7716 2 жыл бұрын
Interesting insights
@babayaga9805
@babayaga9805 3 жыл бұрын
Learn how to google😂😂i have that skill
@marygallagher3831
@marygallagher3831 3 жыл бұрын
b58zh vur.fyi
@satishchhatpar
@satishchhatpar 3 жыл бұрын
Thanks for sharing Payatu and Arjun Singh.
@niraj9226
@niraj9226 3 жыл бұрын
Thank you
@kumarniloy1798
@kumarniloy1798 3 жыл бұрын
Best books for Android hacking or how to start Android os penetration i found a lot of video on youtube but everything is not good quality
@kwsa6604
@kwsa6604 3 жыл бұрын
Do you have now? if you have tell me pls
@kwsa6604
@kwsa6604 2 жыл бұрын
Android hackers handbook is good book
@SDRplayRSP
@SDRplayRSP 3 жыл бұрын
Nice presentation... by the way there are GNU radio source blocks for the SDRplay RSP family of SDR receivers. Technical support from www.radiojitter.com/product/sdrplay-radio-spectrum-processor-rsp1a/
@0xp4ul
@0xp4ul 3 жыл бұрын
❤️👍
@amitnavik
@amitnavik 4 жыл бұрын
password should be paraphrase