hacking, mobile

#MobileSecMondays Video 7 – Solving CrackMe Challenge 2

Another day, another challenge.

In today’s post, we’re going to solve CrackMe Challenge 2.

In this challenge, we’re presented with a login screen with a email, and a secret. Can we find the necessary information to log into the app?

Watch the below video to find out!

Like my content? Buy me a coffee – http://buymeacoffee.com/thefluffy007

hacking, mobile

#MobileSecMondays Video 6 – Solving CrackMe Challenge 1

Another day, another challenge.

In this post, we’re going to solve the first CrackMe challenge.

After reading the instructions, we need to find the secret string using techniques such as decompiling an Android app, and try to reverse engineer the source code.


Watch the below video for more details and to find the secret string!

Like my content? Buy Me a Coffee!

Link: https://buymeacoffee.com/thefluffy007

hacking, mobile

#MobileSecMondays Video 4 – Solving IGLearner Level 2

Hello everyone!

Another day, another challenge.

In this post we’re going to solve this challenge by finding a world-writeable (a file that is writeable by everyone) in the application.

For this challenge we’re going to reverse engineer this app, and review the code to solve the challenge.

Without further ado, check out the video below.

Like my content? Buy me a coffee! buymeacoffee.com/thefluffy007

hacking, mobile

#MobileSecMondays Video 2 – Solving OWASP Mobile Security Testing Guide (MSTG) Uncrackable Level 1

Hello everyone!

Another day, another post.

Here’s the second video from MobileSecMondays.

In this video I’m solving the OWASP Mobile Security Testing Guide (MSTG) Uncrackable Level 1 challenge.

In this challenge we’re going to reverse engineer an app. Using Frida, a dynamic analysis tool to change values during runtime to find a secret message!

Want to learn more and do the challenge yourself? Well watch the video below!

Like the content? Buy me a coffee – buymeacoffee.com/thefluffy007

hacking, mobile

#MobileSecMondays Video 1 – Installing Mobile Apps Using ADB

Hello everyone,


I’m doing something a bit different…

I’ve created a new series where I solve Mobile Security challenges (Android Only). I’ve titled it, “Mobile Sec Mondays”.

With the first video, we’re going to get our feet wet with Android Debug Bridge (ADB). ADB is used for Android mobile hacking. In this video we’re going to install an app from our virtual machine (IntroToAndroidSecurity) to an Androidx86 emulator.

Without further ado, check out the video below!

Enjoy!

Like the content? Buy Me a Coffee! buymeacoffee.com/thefluffy007

mobile

Get Excited! IntroToAndroidSecurity Virtual Machine v2.1.0 is Here!!

Another day, another post.

In this post, I’m going to give to the updates and additions from version 2.0.1 to 2.1.0.

Without further ado, let me give updates on what is included in the version 2.1.0 of the virtual machine.

  1. Added Android Studio. I’ve had people send feedback that they would love to see Android Studio in the virtual machine, so I added it. NOTE: DO NOT use the emulator inside the virtual machine as it’s SUPER slow since Android Studio is inside of an emulator.
  2. Added more insecure apps. Crack Me challenges levels 1-10. These challenges are good for reverse engineering mobile apps. These challenges are about 6-7 years old, but they’re still GREAT for beginners.
  3. Included libraries to connect physical devices to the the virtual machine

It’s OK if you do not have the a physical device. I have an emulator Androidx86 that can be used to play with mobile apps.

If you want to download and play with version 2.1.0 go to this link and click on External Link.

Like the content you’re reading? Support me at – buymeacoffee.com/thefluffy007

mobile

Get Excited! IntroToAndroidSecurity Virtual Machine v2.1.0 is Here!!

Another day, another post.

In this post, I’m going to give to the updates and additions from version 2.0.1 to 2.1.0.

Without further ado, let me give updates on what is included in the version 2.1.0 of the virtual machine.

  1. Added Android Studio. I’ve had people send feedback that they would love to see Android Studio in the virtual machine, so I added it. NOTE: DO NOT use the emulator inside the virtual machine as it’s SUPER slow since Android Studio is inside of an emulator.
  2. Added more insecure apps. Crack Me challenges levels 1-10. These challenges are good for reverse engineering mobile apps. These challenges are about 6-7 years old, but they’re still GREAT for beginners.
  3. Included libraries to connect physical devices to the the virtual machine

It’s OK if you do not have the a physical device. I have an emulator Androidx86 that can be used to play with mobile apps.

If you want to download and play with version 2.1.0 go to this link and click on External Link.

Like the content you’re reading? Support me at – buymeacoffee.com/thefluffy007