The Mobile Security GuysUnlocking the Treasure Trove: Enhancing OSINT through Mobile App HackingOpen Source Intelligence (OSINT) has become an invaluable tool for various fields including cybersecurity, journalism, and law enforcement…Jun 19Jun 19
The Mobile Security GuysiOS 15.6 palera1n — SSH via LANAs mobile app security testers we use modified and jailbroken devices to do a lot of our testing; it allows us access to the filesystem…Jul 18, 20231Jul 18, 20231
The Mobile Security GuysinThe StartupTales of API Woes From a Security Professional Part 2Looking at mobile app API examples and the shortcomings of their security posture.Sep 11, 2020Sep 11, 2020
The Mobile Security GuysTales of API Woes From a Security Professional Part 1APIs need securing properly, not just via obscurity.Sep 11, 2020Sep 11, 2020
The Mobile Security GuysinLevel Up CodingExploiting App PIN Mechanisms on AndroidLocating and exploiting custom application PIN methods.Jul 3, 2020Jul 3, 2020
The Mobile Security GuysinLevel Up CodingBypassing SSL Pinning on AndroidCircumventing certificate pinning on Android with smali patches.Jun 24, 20202Jun 24, 20202
The Mobile Security GuysinThe StartupDefeating Android Root Detection with Smali PatchingBinary patching Android applications to bypass security mechanisms.Jun 16, 20201Jun 16, 20201
The Mobile Security GuysSmali: Assembler for Android’s VMLook at the underlying structure of Android applications using the smali language.Jun 9, 2020Jun 9, 2020
The Mobile Security GuysinThe StartupExploring Native Functions with Frida on Android — part 4We finish the series by examining how to modify input arguments and return values of native functions.Jun 2, 20201Jun 2, 20201
The Mobile Security GuysinThe StartupExploring Native Functions with Frida on Android — part 3Solving a shortcoming of native library tracing using Interceptor()May 27, 2020May 27, 2020