Posts

Showing posts from December, 2020

Security Vulnerability Scanner for iOS and Android

Image
  "Test if your Mobile App has any security flaws and fixes it before it damages your business reputation." Mobile usage is rising, so Mobile apps. The latest research shows that 38% of iOS and 43% of Android APP had high-risk vulnerabilities. If you are the owner, the developer, then you should do all it takes to secure your mobile app. There is plenty of security vulnerability scanner for the website, and the following should help you to find the security flaws in Mobile apps. 0001 Quixxi Quixxi is an intelligent and integrated end-to-end mobile app security solution​. This powerful tool is for developers to protect and monitor any mobile app in minutes.​ You can upload your Android or iOS application file here . 0002 ImmuniWeb ImmuniWeb is an online app scanner to test application against OWASP mobile top 10 vulnerabilities. It performs static and dynamic security tests and provides an actionable report. You can upload your  Android or iOS application file here . You can

CTF Practice - Reverse Engineering Android Apps 101

Image
Introduction On this blog we will crack some real world unsecured Android applications. For educational purpose only! Disclaimer:  This guide is provided "as is" with no warranties with regard to the accuracy and completeness of the information provided herein. I am not responsible for any bad outcomes you or anyone may have because you followed this guide. I expect you to have knowledge of some programming language (Java, Kotlin, C/C++, C#), an inquisitive mind to try things out, and the patience to first google and try to find answers to simple questions. Environment : OpenJDK 8 Android Studio SDK Visual Studio Code IDE with APKLab Reverse Engineering Android Apps - DEX Bytecode The goal of this exercise is to crack a real world Android apps to bypass the verification code to become a premium user. Step 0x1 Download the Apk . Step 0x2 Decompile the APK with Visual Studio Code. Step 0x3 Examine the manifest. We see that it only have one activity. Step 0x4 Look for if-else co

The Importance Ethical Hacking | Penetration Testing | Finding Security Loopholes

Image
For educational purpose only! Disclaimer:   This guide is provided "as is" with no warranties with regard to the accuracy and completeness of the information provided herein. I am not responsible for any bad outcomes you or anyone may have because you followed this guide. You should  think like and act as an adversary to protect your own system . Image by Jae Rue from Pixabay What Is Ethical Hacking? Hackers can bypass security, gain illegal access to perform malicious activities. It is illegal. Ethical hacking is a legal variations of hacking. Companies can hire them to find security weakness in their systems before it falls into the wrong hands. Types Of Hackers White hat hackers This is the ethical hackers. Grey hat hackers Black hat hackers Suicide hackers Types of Ethical Hacking Network hacking Database hacking Website hacking Computer and mobile hacking Email hacking The Importance Of Ethical Hacking The main purpose of ethical hacking is to help companies to find the