hacking, mobile

#MobileSecMondays Video 13 – Solving IG Learner Level 7

Another day, another challenge.

In this post, we will solve IG Learner Level 7. This level has constructed an insecure content provider. In Android-land, A content provider is a data repository. In this case, the data repository is a database. The objective of the level is to find the password for our user, John Doe.

Can we find John Doe’s password? Check out the below video to find out.


If you enjoy my content, buy me a coffee. Link –> http://buymeacoffee.com/thefluffy007

hacking, mobile

#MobileSecMondays Video 11 – Solving IG Learner Level 4

Another day, another challenge.

In this video, we’re going to solve level 4 of the IG Learner app.

Topics explored: configuring mobile device to use a manual proxy to work with Burp. We’re using a interception proxy to capture and possibly modify traffic leaving the client – in this instance our mobile app to the server.

Without further ado, the video is below!

Like my content? Buy me a coffee – http://buymeacoffee.com/thefluffy007

hacking, mobile

#MobileSecMondays Video 8 – So You Want To Configure Burp for Android Devices?! #bugbounties #androidhacking #infosec

Another day, another post.

You, the reader, get a three for one. Three videos in one blog post.

The topics explored are configuring burp for Android Devices. Instead of making this one LONG video, I decided to break it into three videos.

1st video explores downloading the Certificate Authority (root) certificate for Burp

2nd video explores adding the root certificate to our Android emulator using ADB (Android Debug Bridge) and configuring the device and burp to intercept the traffic.

3rd video explores recapping from the beginning what we did to intercept traffic inside an Android device.

I hope you enjoy the content. If you do, please like, subscribe, and share the post and videos!

Without further ado – THE VIDEOS!

Like my content? Buy Me a Coffee! Link here –> https://buymeacoffee.com/thefluffy007

hacking, mobile

#MobileSecMondays Video 6 – Solving CrackMe Challenge 1

Another day, another challenge.

In this post, we’re going to solve the first CrackMe challenge.

After reading the instructions, we need to find the secret string using techniques such as decompiling an Android app, and try to reverse engineer the source code.

Watch the below video for more details and to find the secret string!

Like my content? Buy Me a Coffee!

Link: https://buymeacoffee.com/thefluffy007

hacking, mobile

#MobileSecMondays Video 4 – Solving IGLearner Level 2

Hello everyone!

Another day, another challenge.

In this post we’re going to solve this challenge by finding a world-writeable (a file that is writeable by everyone) in the application.

For this challenge we’re going to reverse engineer this app, and review the code to solve the challenge.

Without further ado, check out the video below.

Like my content? Buy me a coffee! buymeacoffee.com/thefluffy007