
Episode 6: Mobile Hacking Attack Vectors with Teknogeek (Joel Margolis)
Critical Thinking - Bug Bounty Podcast
00:00
How to Attack a Content Provider
content providers are like services where the code exists and it kind of runs in the background. So if you see a content provider, especially one that is lacking permissions or has incorrectly configured permissions, then that's always maybe a juicy attack target to start looking at. Is this whole content provider attacking a content provider? And would we do that if it doesn't have correctly configured permissions,. We would have to interface with that content provider from a different maliciously installed app.
Transcript
Play full episode