Critical Thinking - Bug Bounty Podcast

Episode 6: Mobile Hacking Attack Vectors with Teknogeek (Joel Margolis)

Feb 9, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
The Pixel Lock Screen Bypass
02:27 • 2min
3
How to Be a Successful Hacker
04:14 • 2min
4
How to Start a Mobile Hacking Project
05:46 • 2min
5
How to Unpack an Android APK
08:09 • 2min
6
How to Deflate an Android App
09:41 • 2min
7
Entropy Detection for Android Developers
11:47 • 2min
8
How to Analyze Text to See How It's Readable
13:52 • 2min
9
How to Approach an Android Manifest Dot XML File
15:50 • 2min
10
Android Intent Filters
18:12 • 2min
11
The Importance of Intent Filters in Chrome
19:48 • 2min
12
Android Intent Filter Qualifiers
22:00 • 2min
13
The Intent Filters for Android Apps
23:46 • 2min
14
The Importance of Intent Filters in Hacking
25:42 • 2min
15
Android APK: How to Track Back Intents
27:25 • 2min
16
How to Calm an Android API Demo
29:13 • 2min
17
How to Trace Your Activity Back to Your Code
31:20 • 2min
18
How to Attack Android Apps
32:59 • 3min
19
Android Manifest Dot X: A Data Intent Filter
35:54 • 2min
20
How to Decrypt Java Code for iOS
38:01 • 2min
21
How to Decompile Java Code
40:28 • 2min
22
Exploiting Deep Links in Android
42:52 • 2min
23
The Pros and Cons of App Links
44:49 • 2min
24
How to Secure Cross Communication Between Two Apps
47:07 • 2min
25
Chrome for Android: A New Way to Define Permissions
49:15 • 2min
26
Android Intense in Chrome
50:46 • 2min
27
How to Use a Browsable URL to Launch an Activity
52:49 • 2min
28
How to Use an Intent Scheme to Launch a Granular Android App
55:07 • 2min
29
How to Use a Content Provider in an Android App
57:15 • 2min
30
How to Attack a Content Provider
58:54 • 2min
31
How to Interface With Content Providers on Android
01:00:43 • 2min
32
How to Attack a Web View on Android
01:02:15 • 2min
33
JavaScript Interfaces for Web Views
01:04:00 • 3min
34
JavaScript Interface for Content Providers
01:07:08 • 2min
35
How to Find Vulnerabilities in Android Zero Through 10
01:08:42 • 3min
36
JavaScript Interfaces
01:11:26 • 2min
37
JavaScript Interfaces in IOT Devices
01:13:05 • 2min
38
How to Protect Your Android App From Vulnerabilities
01:14:42 • 2min
39
Exploiting a Broadcast Receiver
01:16:35 • 2min
40
How to Simulate a Malicious App on a Phone
01:18:08 • 2min
41
How to Hack a Native Android App
01:20:01 • 2min
42
API Hacking on Mobile Apps
01:21:39 • 2min
43
How to Hack an Android App
01:23:27 • 2min
44
How to Bypass a Web View Vulnerability in Your Mobile App
01:25:00 • 2min
45
How to Bypass a Pin in an App
01:26:30 • 2min
46
How to Avoid Attack Vectors in Mobile Apps
01:28:19 • 2min
47
ZXing's QR Code Dumping Attack
01:30:44 • 2min
48
How to Use a QR Code Scanner to Send Messages to an Attacker
01:32:34 • 2min
49
How to Rename Functions in JADX
01:35:02 • 3min
50
How to Rename a Function in JavaScript
01:37:33 • 2min