Skip to the content
Hacktive Security Blog
  • Pin Posts
  • Home
  • Mobile

Mobile

0
0
Android IPC: Part 2 – Binder and Service Manager Perspective
Mobile

Android IPC: Part 2 – Binder and Service Manager Perspective

Alessandro Groppo
April 26, 2020June 21, 2021
Introduction As mentioned in the previous article, Android uses the Binder for IPC communications. Good to know, the Binder was not created by Google. Its...
Read More
0
3
Android IPC: Part 1 – Introduction
Mobile

Android IPC: Part 1 – Introduction

Alessandro Groppo
April 5, 2020June 21, 2021
Introduction In the last few months I was studying Android Internals in order to perform some security research in the future. I first tried to...
Read More
0
0
Happy Hacking Easter (story of privacy violation into an eggshell)
Mobile

Happy Hacking Easter (story of privacy violation into an eggshell)

o___o
July 22, 2015June 20, 2021
In accordance with ethics of responsible disclosure, the vendor was informed but emails were left unreplied/ignored Timeline First email on 08 March 2016Second email on...
Read More
0
0
Abusing Ruzzle protocol, privacy violation and more…
Mobile

Abusing Ruzzle protocol, privacy violation and more…

o___o
March 21, 2013June 20, 2021
In the beginning of January 2013 we started a security research project focused on some of the most spreaded mobile applications and considering how popular Ruzzle became...
Read More

Recent Post

CVE-2022-2602: DirtyCred File Exploitation applied on an io_uring UAF

Lock Picking – Part 1

How an Akamai misconfiguration earned us USD 46.000

Workshop: Linux Kernel Exploitation 101 – Part 2

Workshop: Linux Kernel Exploitation 101 – Part 1

Top Category

Application Security

Mobile

Exploitation

  • Pin Posts
Copyright © 2023 Hacktive Security Blog. All rights reserved.
Theme: Masonry Grid By Themeinwp. Powered by WordPress.
To the Top ↑ Up ↑