Skip to the content
Hacktive Security Blog
  • Pin Posts
  • Home
  • Mobile

Mobile

0
0
Android IPC: Part 2 – Binder and Service Manager Perspective
Mobile

Android IPC: Part 2 – Binder and Service Manager Perspective

Alessandro Groppo
April 26, 2020June 21, 2021
Introduction As mentioned in the previous article, Android uses the Binder for IPC communications. Good to know, the Binder was not created by Google. Its...
Read More
0
2
Android IPC: Part 1 – Introduction
Mobile

Android IPC: Part 1 – Introduction

Alessandro Groppo
April 5, 2020June 21, 2021
Introduction In the last few months I was studying Android Internals in order to perform some security research in the future. I first tried to...
Read More
0
0
Happy Hacking Easter (story of privacy violation into an eggshell)
Mobile

Happy Hacking Easter (story of privacy violation into an eggshell)

o___o
July 22, 2015June 20, 2021
In accordance with ethics of responsible disclosure, the vendor was informed but emails were left unreplied/ignored Timeline First email on 08 March 2016Second email on...
Read More
0
0
Abusing Ruzzle protocol, privacy violation and more…
Mobile

Abusing Ruzzle protocol, privacy violation and more…

o___o
March 21, 2013June 20, 2021
In the beginning of January 2013 we started a security research project focused on some of the most spreaded mobile applications and considering how popular Ruzzle became...
Read More

Recent Post

KRWX: Kernel Read Write Execute

Intigriti XSS Challenge – December 2021

Intigriti November XSS Challenge

CVE-2021-43136 – FormaLMS – The evil default value that leads to Authentication Bypass

SA-CONTRIB-2021-036 NotSoSAML – Privilege Escalation via XML Signature Wrapping on MiniorangeSAML Drupal Plugin

Top Category

Application Security

Mobile

Reverse Engineering

  • Pin Posts
Copyright © 2022 Hacktive Security Blog. All rights reserved.
Theme: Masonry Grid By Themeinwp. Powered by WordPress.
To the Top ↑ Up ↑