Critical Thinking - Bug Bounty Podcast cover image

Episode 6: Mobile Hacking Attack Vectors with Teknogeek (Joel Margolis)

Critical Thinking - Bug Bounty Podcast

00:00

How to Attack a Content Provider

content providers are like services where the code exists and it kind of runs in the background. So if you see a content provider, especially one that is lacking permissions or has incorrectly configured permissions, then that's always maybe a juicy attack target to start looking at. Is this whole content provider attacking a content provider? And would we do that if it doesn't have correctly configured permissions,. We would have to interface with that content provider from a different maliciously installed app.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app