Handling Split APKs and Intercepting Network Traffic Without SSL Pinning BypassEffortlessly Debug and Intercept Traffic in Android Apps: A Guide to Handling Split APKs and Bypassing SSL Pinning ChallengesJan 27Jan 27
My Experience completing eMAPT CertificationRandom aesthetic cover — from NotionApr 15, 2024Apr 15, 2024
Buffer-overflow in Android native code — MobileHackingLab ‘Notekeeper’ Write-upExploiting a Buffer-overflow bug in a native library function in an Android App to gain code execution.Jan 31, 20241Jan 31, 20241
De-serialization vulnerability in 3rd Party Library to RCE — MobileHackingLab(Android) ‘Config…Exploiting De-serialization vulnerability in a 3rd party Android library leading to RCE.Jan 17, 2024Jan 17, 2024
XSS & Command Injection in Android — MobileHackingLab ‘Post Board’ write-upA lab that covers XSS in a WebView within Android which could be exploited by other apps in the device, combined with a Command Injection…Jan 16, 20242Jan 16, 20242
Insecure Content Provider in Android — MobileHackingLab ‘Secure Notes’ Write-upThe challenge from MobileHackingLab is a good one for practising the exploitation of an insecure Content Provider.Jan 16, 2024Jan 16, 2024
Path traversal to RCE in Android — Mobile Hacking Lab ‘Document Viewer’ write-upDuring my preparation for eMAPT, I came across Mobile Hacking Lab — and their free hacking labs which I felt would help me for practice…Dec 28, 20231Dec 28, 20231