Runtime Debugging Native Android Shared library (.so) file using IDA Pro
Android AppSec
Runtime Debugging Native Android Shared library (.so) file using IDA Pro
13:17
Android Studio Emulator (AVD) Rooting with Magisk using rootAVD
Android AppSec
Android Studio Emulator (AVD) Rooting with Magisk using rootAVD
4:53
SSAID or ANDROID_ID validation Bypass using Dalvik bytecode Patch -  hpAndro Vulnerable Application
Android AppSec
SSAID or ANDROID_ID validation Bypass using Dalvik bytecode Patch - hpAndro Vulnerable Application
10:18
GPS Location Spoofing  - hpAndro Vulnerable Application Challenge
Android AppSec
GPS Location Spoofing - hpAndro Vulnerable Application Challenge
4:13
Hardcoded Secret in Native Library (.so files) - hpAndro Vulnerable Application Challenge
Android AppSec
Hardcoded Secret in Native Library (.so files) - hpAndro Vulnerable Application Challenge
4:33
RPATH - run-time search path hard-coded in native library - hpAndro Vulnerable Application Challenge
Android AppSec
RPATH - run-time search path hard-coded in native library - hpAndro Vulnerable Application Challenge
7:48
Checking Memory for Sensitive Data (Memory Flag) -  hpAndro Vulnerable Application Challenge
Android AppSec
Checking Memory for Sensitive Data (Memory Flag) - hpAndro Vulnerable Application Challenge
6:16
XML External Entity [XXE] - hpAndro Vulnerable Application Challenge
Android AppSec
XML External Entity [XXE] - hpAndro Vulnerable Application Challenge
4:25
XPath Injection - hpAndro Vulnerable Application Challenge
Android AppSec
XPath Injection - hpAndro Vulnerable Application Challenge
5:23
User Password Enumeration - hpAndro Vulnerable Application Challenge
Android AppSec
User Password Enumeration - hpAndro Vulnerable Application Challenge
5:06
Server Side Request Forgery [SSRF] - hpAndro Vulnerable Application Challenge
Android AppSec
Server Side Request Forgery [SSRF] - hpAndro Vulnerable Application Challenge
6:01
Server Fingerprinting - hpAndro Vulnerable Application Challenge
Android AppSec
Server Fingerprinting - hpAndro Vulnerable Application Challenge
1:47
Remote File Inclusion [RFI] - hpAndro Vulnerable Application Challenge
Android AppSec
Remote File Inclusion [RFI] - hpAndro Vulnerable Application Challenge
3:18
REST API HTTP Methods - hpAndro Vulnerable Application Challenge
Android AppSec
REST API HTTP Methods - hpAndro Vulnerable Application Challenge
2:58
Unrestricted File Upload - hpAndro Vulnerable Application Challenge
Android AppSec
Unrestricted File Upload - hpAndro Vulnerable Application Challenge
4:15
Server Side Template Injection [SSTI] - hpAndro Vulnerable Application Challenge
Android AppSec
Server Side Template Injection [SSTI] - hpAndro Vulnerable Application Challenge
6:55
S3 Bucket Misconfiguration - hpAndro Vulnerable Application Challenge
Android AppSec
S3 Bucket Misconfiguration - hpAndro Vulnerable Application Challenge
4:56
RIA Cross Domain Policy - hpAndro Vulnerable Application Challenge
Android AppSec
RIA Cross Domain Policy - hpAndro Vulnerable Application Challenge
2:51
Review Comment and Meta Data - hpAndro Vulnerable Application Challenge
Android AppSec
Review Comment and Meta Data - hpAndro Vulnerable Application Challenge
2:01
OTP Bruteforce - hpAndro Vulnerable Application Challenge
Android AppSec
OTP Bruteforce - hpAndro Vulnerable Application Challenge
7:58
Old Backup Files - hpAndro Vulnerable Application Challenge
Android AppSec
Old Backup Files - hpAndro Vulnerable Application Challenge
2:17
Login Bypass Cookie Manipulation - hpAndro Vulnerable Application Challenge
Android AppSec
Login Bypass Cookie Manipulation - hpAndro Vulnerable Application Challenge
2:23
JWT Misconfiguration - hpAndro Vulnerable Application Challenge
Android AppSec
JWT Misconfiguration - hpAndro Vulnerable Application Challenge
3:48
JSON to XXE Blind - hpAndro Vulnerable Application Challenge
Android AppSec
JSON to XXE Blind - hpAndro Vulnerable Application Challenge
4:26
JavaScript Info Leak - hpAndro Vulnerable Application Challenge
Android AppSec
JavaScript Info Leak - hpAndro Vulnerable Application Challenge
4:41
Insecure Direct Object References [IDOR] - hpAndro Vulnerable Application Challenge
Android AppSec
Insecure Direct Object References [IDOR] - hpAndro Vulnerable Application Challenge
4:18
Encoding & Hashing - hpAndro Vulnerable Application Challenge
Android AppSec
Encoding & Hashing - hpAndro Vulnerable Application Challenge
4:11
Default Credential - hpAndro Vulnerable Application Challenge
Android AppSec
Default Credential - hpAndro Vulnerable Application Challenge
2:02
Client Side Validation Bypass - hpAndro Vulnerable Application Challenge
Android AppSec
Client Side Validation Bypass - hpAndro Vulnerable Application Challenge
2:20
Ninjutsu Android Penetration Testing Environment - MEmu based emulator
Android AppSec
Ninjutsu Android Penetration Testing Environment - MEmu based emulator
12:38
2FA Bypass
Android AppSec
2FA Bypass
33:57
HTML5 Controls (Local Storage) - hpAndro Vulnerable Application Challenge
Android AppSec
HTML5 Controls (Local Storage) - hpAndro Vulnerable Application Challenge
2:56
House - Dynamic Mobile Analysis Tool
Android AppSec
House - Dynamic Mobile Analysis Tool
11:32
#Medusa - Extensible binary instrumentation framework based on #FRIDA for Android applications
Android AppSec
#Medusa - Extensible binary instrumentation framework based on #FRIDA for Android applications
12:24
SSH/SFTP Server Terminal - Powerful SSH server for Android
Android AppSec
SSH/SFTP Server Terminal - Powerful SSH server for Android
3:41
Identifying and Breaking RSA Encryption Logic using Profile or Debug APK (Android Studio) - RSA flag
Android AppSec
Identifying and Breaking RSA Encryption Logic using Profile or Debug APK (Android Studio) - RSA flag
25:18
FЯIDA - Dynamic Instrumentation Toolkit - Setting up your Android device
Android AppSec
FЯIDA - Dynamic Instrumentation Toolkit - Setting up your Android device
8:42
Inspeckage - Android Package Inspector
Android AppSec
Inspeckage - Android Package Inspector
8:25
Xposed Framework installation in Genymotion
Android AppSec
Xposed Framework installation in Genymotion
5:12
Identifying and Breaking Encryption Logic using smali debugging - AES flag
Android AppSec
Identifying and Breaking Encryption Logic using smali debugging - AES flag
43:38
smali debugging using Android Studio
Android AppSec
smali debugging using Android Studio
8:50
Decompile - Modify - Recompile - Sign (APK)
Android AppSec
Decompile - Modify - Recompile - Sign (APK)
6:33
smali mapping with Java code using jadx-gui and apktool
Android AppSec
smali mapping with Java code using jadx-gui and apktool
5:10
BurpSuite - Intercept HTTPS request
Android AppSec
BurpSuite - Intercept HTTPS request
7:43
BurpSuite - Intercept HTTP request
Android AppSec
BurpSuite - Intercept HTTP request
5:03
jadx-gui - Dex to Java decompiler
Android AppSec
jadx-gui - Dex to Java decompiler
2:14
Reverse Engineering Android APK file using apktool
Android AppSec
Reverse Engineering Android APK file using apktool
2:36
Install JRE (for apktool) and ADB (sdk-platform-tools)
Android AppSec
Install JRE (for apktool) and ADB (sdk-platform-tools)
2:41
Verifying genymotion plugin with Android Studio
Android AppSec
Verifying genymotion plugin with Android Studio
4:34
Install Genymotion and Play Store
Android AppSec
Install Genymotion and Play Store
6:33
Install genymotion plugin in Android Studio
Android AppSec
Install genymotion plugin in Android Studio
1:22
Install smalidea plugin in Android Studio
Android AppSec
Install smalidea plugin in Android Studio
2:21
Install Android Studio
Android AppSec
Install Android Studio
3:36
2FA Bypass - Status Code Manipulation
Android AppSec
2FA Bypass - Status Code Manipulation
2:10
Configuring an Android Device to Work With Burp - Install Burp Certificate : HTTPS interception
Android AppSec
Configuring an Android Device to Work With Burp - Install Burp Certificate : HTTPS interception
7:26
Configuring an Android Device to Work With Burp - Intercept HTTP Traffic
Android AppSec
Configuring an Android Device to Work With Burp - Intercept HTTP Traffic
4:47
How to Install and Use MobSF(Mobile Security Framework) on Windows 10 via Docker in 5 Min ?
Android AppSec
How to Install and Use MobSF(Mobile Security Framework) on Windows 10 via Docker in 5 Min ?
4:08
How to Install and Use MobSF(Mobile Security Framework) on Ubuntu via Docker in 5 Min ?
Android AppSec
How to Install and Use MobSF(Mobile Security Framework) on Ubuntu via Docker in 5 Min ?
7:31
Check application logs and find a flags.
Android AppSec
Check application logs and find a flags.
1:56
Sensitive information stored in Internal Storage - Android CTF
Android AppSec
Sensitive information stored in Internal Storage - Android CTF
1:28
Insecure storage in Shared Preferences - Android CTF
Android AppSec
Insecure storage in Shared Preferences - Android CTF
1:37
SQLite Databases (Unencrypted) Challange in Android CTF
Android AppSec
SQLite Databases (Unencrypted) Challange in Android CTF
2:45
UDP TRAFFIC MITM
Android AppSec
UDP TRAFFIC MITM
3:10
TCP TRAFFIC MITM
Android AppSec
TCP TRAFFIC MITM
3:36
HTTPS Traffic Interception using BURP Suite Proxy
Android AppSec
HTTPS Traffic Interception using BURP Suite Proxy
0:41
HTTP Traffic Interception using BURP Suite Proxy
Android AppSec
HTTP Traffic Interception using BURP Suite Proxy
0:59
2FA BYPASS -  OTP Leakage in Response
Android AppSec
2FA BYPASS - OTP Leakage in Response
1:25
2FA BYPASS USING SMALI DEBUGGING
Android AppSec
2FA BYPASS USING SMALI DEBUGGING
10:47
Install Cydia Substrate in Android 4.2.2 Genymotion
Android AppSec
Install Cydia Substrate in Android 4.2.2 Genymotion
1:22
Install Xposed Framework in Genymotion
Android AppSec
Install Xposed Framework in Genymotion
3:39