Three Ways to Hack Mobile Apps

Поделиться
HTML-код
  • Опубликовано: 6 окт 2024
  • jh.live/guards... || Protect and defend your own mobile applications with Guardsquare! jh.live/guards...
    Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricet...
    Learn Coding: jh.live/codecr...
    Don't listen to other "influencer" VPN crap -- host YOUR OWN: jh.live/openvpn
    WATCH MORE:
    Dark Web & Cybercrime Investigations: • Tracking Cybercrime on...
    Malware & Hacker Tradecraft: • Malware Analysis & Thr...
    📧JOIN MY NEWSLETTER ➡ jh.live/email
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥RUclips ALGORITHM ➡ Like, Comment, & Subscribe!

Комментарии • 40

  • @wkgall
    @wkgall 7 часов назад +4

    for a while John H. focused on very niche scenarios on cyber security, I'm glad he is talking about what most devs do assuming that is so common , that all the loop holes are fixed and unexploitable due to it being so mainstream. I'm all ears !

  • @nikolaybarekov2063
    @nikolaybarekov2063 6 часов назад +7

    Conclusion: Do not store sensitive info on the client, doesn't matter if it is a mobile, web or desktop application

  • @MichealVey1sted
    @MichealVey1sted 10 часов назад +18

    Never realized that all my java app dev would come to use one of these days lmao

    • @x.plorer
      @x.plorer 4 часа назад

      these days they use kotlin and frameworks like react and flutter

    • @MichealVey1sted
      @MichealVey1sted Час назад

      @@x.plorer For sure. Why write in two languages (java and swift) the same application when you can just write in one (react native) and have it go to both?

  • @wrathofainz
    @wrathofainz 5 часов назад +1

    Yaaaas. I've done a bit of this stuff, but didn't really get into it (got sidetracked, priorities changed).
    This ought to be enlightening.

  • @ThisIsJustADrillBit
    @ThisIsJustADrillBit 10 часов назад +4

    This dude just keeps dropping absolute 🔥❤

  • @anomalydheryn5492
    @anomalydheryn5492 10 часов назад

    Finally Jhon..!!! episode I've been waiting for..

  • @azizazizsabek232
    @azizazizsabek232 4 часа назад +1

    Complete this lesson signature Spoofing ❤for us regarding the confusion on the antivirus application ❤❤

  • @RajendraShahi-f1x
    @RajendraShahi-f1x 10 часов назад +1

    Always mind-blowing 🎉

  • @cyberwarfare-yt1wq
    @cyberwarfare-yt1wq Час назад

    we need more from this videos (mobile and apps)

  • @ryd3v
    @ryd3v 2 часа назад

    Thumbnail on point

  • @incurled
    @incurled 10 часов назад

    great video, i've enjoyed the first 15 seconds

  • @P3ntest3r
    @P3ntest3r 10 часов назад +1

    Great video appsec 🎉

  • @syedalbaher
    @syedalbaher 10 часов назад +2

    Hey John, just to let you know that you're doing great work here! 🔥🔥🔥

  • @boanproject
    @boanproject 10 часов назад

    thank you!! good information

  • @Vietnam35162
    @Vietnam35162 9 часов назад

    Hello

  • @not_user11
    @not_user11 36 минут назад

    eyenit

  • @TORGRAIN
    @TORGRAIN 2 часа назад

    6:06 The most obvious and worst way to detect root and debugger
    Wdym by clever way?
    Only the developers who don't care about people exploiting their software would do this method.

  • @carsonjamesiv2512
    @carsonjamesiv2512 9 часов назад

    COOL.😃

  • @salmon85
    @salmon85 10 часов назад +1

    sup

    • @meiilol
      @meiilol 10 часов назад +2

      the sky

    • @jayy2k5
      @jayy2k5 10 часов назад

      ​@@meiilolroof for me

  • @magma1034
    @magma1034 10 часов назад

    yay

  • @raihanrafi3665
    @raihanrafi3665 9 часов назад

    Next please analyze spyloan app that haunting indonesian people

  • @Balochzadag
    @Balochzadag 8 часов назад

    Guard square 😮

  • @draxler.a
    @draxler.a 9 часов назад +2

    BS untile now no one made a real android app haking
    this is just veryyyyyy basic shit
    no anti frida detection
    no anti signature verification
    dex encreption ...........MORE.........MORE...............MORE...............
    and when you crack thos tecknique they come with more advance one / modified aproch
    a real app is not that eazy .
    im tired from thos usless content

    • @Mr_Bunneh
      @Mr_Bunneh 9 часов назад

      You're wrong.

    • @codermomo1792
      @codermomo1792 9 часов назад

      I did not watch yet, but there is a course at INE about this

    • @TORGRAIN
      @TORGRAIN 2 часа назад

      These are all the same shit and they all are useless
      And who would put their api key in client side I mean just lol
      I'm getting into advanced static debugging and modifying protected .lib and I can tell you this content is pretty useless as you said

    • @TORGRAIN
      @TORGRAIN 2 часа назад

      ​@@Mr_Bunnehwhy tho?
      I'm distributing paid games and apps on my website
      These contents are utterly useless
      They won't get you anywhere past the very beginning of the reverse engineering

  • @ClintonG56
    @ClintonG56 7 часов назад

    Unrelated but can somebody help me get my microsoft account back? The hacker changed my password and deleted all the account information. And he also added his own phone number and authentication app

    • @Dox_N_Drive
      @Dox_N_Drive 7 часов назад +3

      That’s the hacker account now

    • @alexhellings3691
      @alexhellings3691 6 часов назад

      The best you could do would probably be to email Microsoft and tell them your predicament. Best of luck, and I’m sorry this happened. If you can get the account back, make sure to set up 2 factor authentication!

    • @iamvinny
      @iamvinny 5 часов назад +4

      yes, like alex said, go and tell microsoft that you’re pregnant