πŸ”
AppSec & Pentest
Ctrlk
  • Mobile
  • Pentesting Methodology
  • Programming
    • Аналитика
    • iOS
    • Android
    • PWA
    • Hybrid App
    • Π Π΅ΠΊΠΎΠΌΠ΅Π½Π΄Π°Ρ†ΠΈΠΈ
    • AirWatch MDM
    • Π”ΠΈΡΡ‚Ρ€ΠΈΠ±ΡŒΡŽΡ†ΠΈΡ
  • Forensic
    • Bluetooth
    • NFC
    • GSM
    • SIM-cards
    • iOS
    • Android
  • Pentest
    • Уязвимости ΠΈ Атаки
      • Изи Π±Π°Π³ΠΈ
      • Common
      • iOS
      • Android
      • AppLinks
      • Auth
        • Biometrics bypass
        • PIN Bruteforce
        • Π’ΠΈΠΏΠΈΡ‡Π½Ρ‹Π΅ ошибки Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ SMS-Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ
      • USSD Attack
      • Java Object Deserialization
      • Lack of binary protection (anti-debugging) controls
      • Disabled security features in binary libraries
      • Lack of exploit mitigations (e.g. PIE, ARC, or stack canaries)
      • Path disclosure in the binary
      • Runtime hacking exploits (e.g. exploits that are only possible in a jailbroken environment)
      • Snapshot/pasteboard leakage
      • User data stored unencrypted in the file system and/or external storage
      • Android Task Hijacking
      • WebView
    • ΠšΠ΅ΠΉΡΡ‹
    • Bug Bounty
    • Настройка окруТСния
    • Mitigations
    • Books & Papers
    • Companies & People & Blogs
    • Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Ρ‹ ΠΈ скрипты
  • Reverse Engineering
    • Android
    • iOS
    • Tools
    • ΠšΠ΅ΠΉΡΡ‹
    • Π‘Ρ‚Π°Ρ‚ΡŒΠΈ
  • Administration
    • Π˜Π½ΡΡ‚Ρ€ΡƒΠΌΠ΅Π½Ρ‚Ρ‹
Powered by GitBook
On this page

Was this helpful?

  1. Pentest
  2. Уязвимости ΠΈ Атаки

Auth

Biometrics bypassPIN BruteforceΠ’ΠΈΠΏΠΈΡ‡Π½Ρ‹Π΅ ошибки Ρ€Π΅Π°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ SMS-Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ
PreviousAppLinksNextBiometrics bypass

Was this helpful?