Top 4 Android App Vulnerabilities Explained!

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024

Комментарии • 68

  • @TechRaj156
    @TechRaj156  2 года назад +7

    Check out BeVigil, Internet's first Mobile App Security Search Engine: bevigil.com/
    Using BeVigil, you can search for an app name, code patterns, etc and get a full report on the App's vulnerabilities and other issues it has, along with a security rating out of 10. It's an incredibly helpful tool to perform static testing.

    • @abemon4844
      @abemon4844 2 года назад

      viya plz open mail
      i need ur help

    • @exclusiveclips9690
      @exclusiveclips9690 2 года назад

      Bhaiya pls ek course bna do na ceh v11 pe ethical hacking course ka piliz 🙃 love from delhi

  • @muskansarumagar3814
    @muskansarumagar3814 2 года назад +10

    Bro you look exactly like Binayak kuikel from Nepal😁

  • @organicmechanic5150
    @organicmechanic5150 2 года назад +2

    I love your hoodie bro. Kali Linux is a formidable piece of software. Informative content and I have just subbed.

  • @rootxgod1086
    @rootxgod1086 2 года назад +3

    Very thanks to Sponsor ☺️

  • @hardikjain3153
    @hardikjain3153 2 года назад +4

    Can you tell how to protect the API key used in the android app?

  • @anshulagrawal5534
    @anshulagrawal5534 2 года назад +3

    How does bevigil know the source code of these apps

  • @DhruvCanada
    @DhruvCanada 2 года назад +2

    You’re video’s are super helpful *even I’m going to pursue a cyber security degree from canada.!*

  • @amanbahiniya
    @amanbahiniya 2 года назад +1

    Bro how to get the knowledge like you like you know about source code analysis so how to get these kind of Knowledge where we ourself find this kind of vulnerability?

  • @marcogawa
    @marcogawa 11 месяцев назад

    Great video Raj!

  • @raahul2813
    @raahul2813 2 года назад +2

    RUclips has not sended me the notifications of your last 5 videos

  • @technicaltechnmofficial2513
    @technicaltechnmofficial2513 2 года назад +1

    I would like to know What is your graduation sir .... Please reply..

  • @dimlight1172
    @dimlight1172 2 года назад +1

    Very informative!!
    Thanks brother

  • @vaishakhareendranath1918
    @vaishakhareendranath1918 2 года назад +1

    Beautifully explained dear friend 👏

  • @segavick756
    @segavick756 6 месяцев назад

    I aint tryna do mischie-
    Wha?😂😂

  • @coolsai
    @coolsai 2 года назад +3

    lets hack Domino's and order whole menu🤣

  • @physics3641
    @physics3641 2 года назад

    My question is where did you buy the hoodie from?😂

  • @aaftabahmed6876
    @aaftabahmed6876 2 года назад

    i didn't get it too + str + in VI app , what does it mean and how attacker will input the value, eg?

  • @sandhyaishere
    @sandhyaishere 2 года назад

    Hello sir,
    do you reported all this vulnerability

  • @Nirmal_Patel_
    @Nirmal_Patel_ 2 года назад

    how can i check any websites security-related issues ❌???

  • @saracharts5184
    @saracharts5184 2 года назад

    Does android 12 has usb vulnerability if i have strong password or finger scan lock to mobile but left my mobile mistakly on a place can someone take it and use usb debug or usb connection to install spyapp and root my mobile but he dont know the password

  • @puneetdedha4605
    @puneetdedha4605 2 года назад +1

    From where you have learnt all these things?

    • @puneetdedha4605
      @puneetdedha4605 2 года назад +1

      @Areeb Ahmed Shariff i have asked him, "from where" not "how". i meant to say if he had learnt it all by himself using internet or is there any course or institute from where he learnt all this....

    • @puneetdedha4605
      @puneetdedha4605 2 года назад

      @Areeb Ahmed Shariff can you please recommend me some channels to learn from basics as i don't have any idea about programming and the stuff...

  • @NIHALREYAS
    @NIHALREYAS 2 года назад +1

    Tech raj🖤🖤

  • @NatetheNintendofan
    @NatetheNintendofan Год назад

    How about they find a vulnerability that's that will let you real Android device that hacks it so it gives you OEM unlock

  • @Queers4Islam
    @Queers4Islam 2 года назад

    ADB is a nightmare, someone has had me stuck under a fake enterprise work profile policy, honestly is bringing me stress after 9 months of it

    • @NatetheNintendofan
      @NatetheNintendofan Год назад

      Bro you don't even know how to use a b d it's easy all you need to do is right click in the folder where the ABD .exe is and then you need to just click the right click and then you and then in the command when do you need just to type the command abd.exe and then whatever thing you want to do

  • @sven5666
    @sven5666 Год назад

    Encrypting local data by the app is bullshit. A root user can decrypt it anyway. Android encrypts all data for you. Of course for most sensitive data provided apis should be used.

  • @TechnicalHeavenSM
    @TechnicalHeavenSM 2 года назад

    Awesome

  • @rishantarora3486
    @rishantarora3486 2 года назад

    I want to learn ethical hacking. where should i start?

  • @hazed69
    @hazed69 2 года назад

    Kali hoodie 😁

  • @R4YTUBE
    @R4YTUBE 2 года назад

    Thank you ;-)

  • @shahrahul5872
    @shahrahul5872 2 года назад

    Supaaar bro

  • @sharathbnaik3232
    @sharathbnaik3232 2 года назад +1

    🔥

  • @sudeepsimpi2499
    @sudeepsimpi2499 2 года назад

    Hello , I Really Like Your Videos & they are Damm Great 💫 , So I Request You to Make A Course Regarding Ethical Hacking From Basic & Guide Us , as we are Beginners & don't know exactly how to fit in this filed . Plz take into Consideration . At last I LOVE Your Content ❣️

    • @danielidonchangeambecauseo7889
      @danielidonchangeambecauseo7889 2 года назад +1

      Keep learning and if you feel you are tired take a break but don't stop
      ... That's just the secret . And come back 10X prepared .

    • @sudeepsimpi2499
      @sudeepsimpi2499 2 года назад

      @@danielidonchangeambecauseo7889 Thnx & Ur Also in this Field !

    • @danielidonchangeambecauseo7889
      @danielidonchangeambecauseo7889 2 года назад

      @@sudeepsimpi2499 yes I won't tell you I'm professional but I'm capable enough to coach you on how to go about it as a beginner.

    • @danielidonchangeambecauseo7889
      @danielidonchangeambecauseo7889 2 года назад

      @@sudeepsimpi2499 yes I won't tell you I'm professional but I'm capable enough to coach you on how to go about it as a beginner.

    • @sudeepsimpi2499
      @sudeepsimpi2499 2 года назад

      @@danielidonchangeambecauseo7889 Thnx for the Reply & I'm Waiting for Such Oppertunity , Can u Do it ! ✨

  • @maharshibarot5732
    @maharshibarot5732 2 года назад

    How I download kali in lower end pc

    • @maharshibarot5732
      @maharshibarot5732 2 года назад

      Out of budget 😑

    • @puneetdedha4605
      @puneetdedha4605 2 года назад +1

      If you have 4 gb ram( min. 2gb) and i3 processor (not sure about which generation can handle kali Linux smoothly), you can checkout channel "ksk royal",he make great videos about installing linux...

    • @maharshibarot5732
      @maharshibarot5732 2 года назад

      @@puneetdedha4605 thanks bhai

  • @bahai9706
    @bahai9706 2 года назад

    300th like brother!

  • @legends6740
    @legends6740 9 месяцев назад

    OUTDATED INFO

  • @sureshkumar-gg1qh
    @sureshkumar-gg1qh 11 месяцев назад

    Not rewardable ...by any programme ...not even informative ...try something new like intent vulnerability

  • @scrambledsocks9295
    @scrambledsocks9295 2 года назад

    oh ho ho kali vali tshirt

  • @abemon4844
    @abemon4844 2 года назад

    plz help me

  • @gowth_am
    @gowth_am 2 года назад

    ❤❤❤❤

  • @chetangupta2612
    @chetangupta2612 2 года назад

    😘

  • @FARZAN2.0
    @FARZAN2.0 2 года назад +1

    plzz bro speak hindi

  • @crafterpanda8419
    @crafterpanda8419 2 года назад

    First

  • @my_love_sanatan
    @my_love_sanatan Год назад

    1.Api keys cannot be used without same package name
    2. We cannot get anything after compiling code in Java as it cannot be recompiled to get the new changes
    3. Any token or any information cannot be used without endpoints
    STOP SPREADING MYTH OF HACK 😂😂😂

  • @krpubg3024
    @krpubg3024 2 года назад

    Lol adb is feature not loop 😂 without unlock Bootloader not access adb feature This video like agar aap aapna phone kisi or ko do ge toh aapka data koi dekh sakta hai 🤣🤭

    • @tgdesihiphopraps
      @tgdesihiphopraps 2 года назад

      He just explained what is adb and why he is using it.

    • @krpubg3024
      @krpubg3024 2 года назад

      So why Your thumbnail mansion Android Loopholes

  • @UnathiGX
    @UnathiGX 2 года назад

    Raj sounds like @AdamSomething

  • @steiner254
    @steiner254 Год назад

    Interesting

  • @FARZAN2.0
    @FARZAN2.0 2 года назад +1

    plzz bro speak hindi

    • @hazed69
      @hazed69 2 года назад +8

      We don't know Hindi bro