

Episode 6: Mobile Hacking Attack Vectors with Teknogeek (Joel Margolis)
Feb 9, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
Introduction
00:00 • 2min
The Pixel Lock Screen Bypass
02:27 • 2min
How to Be a Successful Hacker
04:14 • 2min
How to Start a Mobile Hacking Project
05:46 • 2min
How to Unpack an Android APK
08:09 • 2min
How to Deflate an Android App
09:41 • 2min
Entropy Detection for Android Developers
11:47 • 2min
How to Analyze Text to See How It's Readable
13:52 • 2min
How to Approach an Android Manifest Dot XML File
15:50 • 2min
Android Intent Filters
18:12 • 2min
The Importance of Intent Filters in Chrome
19:48 • 2min
Android Intent Filter Qualifiers
22:00 • 2min
The Intent Filters for Android Apps
23:46 • 2min
The Importance of Intent Filters in Hacking
25:42 • 2min
Android APK: How to Track Back Intents
27:25 • 2min
How to Calm an Android API Demo
29:13 • 2min
How to Trace Your Activity Back to Your Code
31:20 • 2min
How to Attack Android Apps
32:59 • 3min
Android Manifest Dot X: A Data Intent Filter
35:54 • 2min
How to Decrypt Java Code for iOS
38:01 • 2min
How to Decompile Java Code
40:28 • 2min
Exploiting Deep Links in Android
42:52 • 2min
The Pros and Cons of App Links
44:49 • 2min
How to Secure Cross Communication Between Two Apps
47:07 • 2min
Chrome for Android: A New Way to Define Permissions
49:15 • 2min
Android Intense in Chrome
50:46 • 2min
How to Use a Browsable URL to Launch an Activity
52:49 • 2min
How to Use an Intent Scheme to Launch a Granular Android App
55:07 • 2min
How to Use a Content Provider in an Android App
57:15 • 2min
How to Attack a Content Provider
58:54 • 2min
How to Interface With Content Providers on Android
01:00:43 • 2min
How to Attack a Web View on Android
01:02:15 • 2min
JavaScript Interfaces for Web Views
01:04:00 • 3min
JavaScript Interface for Content Providers
01:07:08 • 2min
How to Find Vulnerabilities in Android Zero Through 10
01:08:42 • 3min
JavaScript Interfaces
01:11:26 • 2min
JavaScript Interfaces in IOT Devices
01:13:05 • 2min
How to Protect Your Android App From Vulnerabilities
01:14:42 • 2min
Exploiting a Broadcast Receiver
01:16:35 • 2min
How to Simulate a Malicious App on a Phone
01:18:08 • 2min
How to Hack a Native Android App
01:20:01 • 2min
API Hacking on Mobile Apps
01:21:39 • 2min
How to Hack an Android App
01:23:27 • 2min
How to Bypass a Web View Vulnerability in Your Mobile App
01:25:00 • 2min
How to Bypass a Pin in an App
01:26:30 • 2min
How to Avoid Attack Vectors in Mobile Apps
01:28:19 • 2min
ZXing's QR Code Dumping Attack
01:30:44 • 2min
How to Use a QR Code Scanner to Send Messages to an Attacker
01:32:34 • 2min
How to Rename Functions in JADX
01:35:02 • 3min
How to Rename a Function in JavaScript
01:37:33 • 2min