Three Ways to Hack Mobile Apps
HTML-код
- Опубликовано: 6 окт 2024
- jh.live/guards... || Protect and defend your own mobile applications with Guardsquare! jh.live/guards...
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricet...
Learn Coding: jh.live/codecr...
Don't listen to other "influencer" VPN crap -- host YOUR OWN: jh.live/openvpn
WATCH MORE:
Dark Web & Cybercrime Investigations: • Tracking Cybercrime on...
Malware & Hacker Tradecraft: • Malware Analysis & Thr...
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥RUclips ALGORITHM ➡ Like, Comment, & Subscribe!
for a while John H. focused on very niche scenarios on cyber security, I'm glad he is talking about what most devs do assuming that is so common , that all the loop holes are fixed and unexploitable due to it being so mainstream. I'm all ears !
Conclusion: Do not store sensitive info on the client, doesn't matter if it is a mobile, web or desktop application
Never realized that all my java app dev would come to use one of these days lmao
these days they use kotlin and frameworks like react and flutter
@@x.plorer For sure. Why write in two languages (java and swift) the same application when you can just write in one (react native) and have it go to both?
Yaaaas. I've done a bit of this stuff, but didn't really get into it (got sidetracked, priorities changed).
This ought to be enlightening.
This dude just keeps dropping absolute 🔥❤
Finally Jhon..!!! episode I've been waiting for..
Complete this lesson signature Spoofing ❤for us regarding the confusion on the antivirus application ❤❤
Always mind-blowing 🎉
we need more from this videos (mobile and apps)
Thumbnail on point
great video, i've enjoyed the first 15 seconds
Great video appsec 🎉
Hey John, just to let you know that you're doing great work here! 🔥🔥🔥
cringe
thank you!! good information
Hello
eyenit
6:06 The most obvious and worst way to detect root and debugger
Wdym by clever way?
Only the developers who don't care about people exploiting their software would do this method.
COOL.😃
sup
the sky
@@meiilolroof for me
yay
Next please analyze spyloan app that haunting indonesian people
Guard square 😮
BS untile now no one made a real android app haking
this is just veryyyyyy basic shit
no anti frida detection
no anti signature verification
dex encreption ...........MORE.........MORE...............MORE...............
and when you crack thos tecknique they come with more advance one / modified aproch
a real app is not that eazy .
im tired from thos usless content
You're wrong.
I did not watch yet, but there is a course at INE about this
These are all the same shit and they all are useless
And who would put their api key in client side I mean just lol
I'm getting into advanced static debugging and modifying protected .lib and I can tell you this content is pretty useless as you said
@@Mr_Bunnehwhy tho?
I'm distributing paid games and apps on my website
These contents are utterly useless
They won't get you anywhere past the very beginning of the reverse engineering
Unrelated but can somebody help me get my microsoft account back? The hacker changed my password and deleted all the account information. And he also added his own phone number and authentication app
That’s the hacker account now
The best you could do would probably be to email Microsoft and tell them your predicament. Best of luck, and I’m sorry this happened. If you can get the account back, make sure to set up 2 factor authentication!
yes, like alex said, go and tell microsoft that you’re pregnant