🔏
AppSec & Pentest
Ctrlk
  • Mobile
  • Pentesting Methodology
  • Programming
    • Аналитика
    • iOS
    • Android
    • PWA
    • Hybrid App
    • Рекомендации
    • AirWatch MDM
    • Дистрибьюция
  • Forensic
    • Bluetooth
    • NFC
    • GSM
    • SIM-cards
    • iOS
    • Android
  • Pentest
    • Уязвимости и Атаки
      • Изи баги
      • Common
      • iOS
      • Android
      • AppLinks
      • Auth
      • USSD Attack
      • Java Object Deserialization
      • Lack of binary protection (anti-debugging) controls
      • Disabled security features in binary libraries
      • Lack of exploit mitigations (e.g. PIE, ARC, or stack canaries)
      • Path disclosure in the binary
      • Runtime hacking exploits (e.g. exploits that are only possible in a jailbroken environment)
      • Snapshot/pasteboard leakage
      • User data stored unencrypted in the file system and/or external storage
      • Android Task Hijacking
      • WebView
    • Кейсы
    • Bug Bounty
    • Настройка окружения
    • Mitigations
    • Books & Papers
    • Companies & People & Blogs
    • Инструменты и скрипты
  • Reverse Engineering
    • Android
    • iOS
    • Tools
    • Кейсы
    • Статьи
  • Administration
    • Инструменты
Powered by GitBook
On this page

Was this helpful?

  1. Pentest

Уязвимости и Атаки

Изи багиCommoniOSAndroidAppLinksAuthUSSD AttackJava Object DeserializationLack of binary protection (anti-debugging) controlsDisabled security features in binary librariesLack of exploit mitigations (e.g. PIE, ARC, or stack canaries)Path disclosure in the binaryRuntime hacking exploits (e.g. exploits that are only possible in a jailbroken environment)Snapshot/pasteboard leakageUser data stored unencrypted in the file system and/or external storageAndroid Task HijackingWebView
PreviousTWRPNextИзи баги

Last updated 2 years ago

Was this helpful?