Mobile Bug Bounty Hunting? Enter BLEIf you are hunting mobile bug bounties you must know by now how difficult it can be to find new kind of vulnerabilities. Common…Dec 11, 2022Dec 11, 2022
Published inInfoSec Write-upsWar against COVID-19 while i was developing an InfoSec productWhile we was locked-down at home due to covid-19, i developed a security-related product.Aug 9, 2020Aug 9, 2020
Published inInfoSec Write-upsAndroid Dynamic Analysis— using FrinJa Generic ScriptsAndroid Applications generic dynamic analysis (quick and dirty) for penetration testers using FrinJa.Jul 27, 2020Jul 27, 2020
Published inInfoSec Write-upsNorec Attack: Stripping BLE encryption from Nordic’s Library (CVE-2020–15509)This article talks about a vulnerability i have found in a library that almost every android application is based on, in a combination…Jul 3, 2020Jul 3, 2020
Published inInfoSec Write-upsTrackR — User’s Private Information Exposed (VU#762643)The TL;DRMay 6, 20202May 6, 20202
Reverse Engineer and Win AlwaysObserving the app’s source code, I was able to identify the classes that reveal the whole logic behind the application. Additionally, I…Nov 9, 2019Nov 9, 2019