Hacking Android Deeplink Issues | Insecure URL Validation | Android Pentesting

Поделиться
HTML-код
  • Опубликовано: 15 июн 2021
  • Deeplink and Insecure URL Validation
    Resources :
    Webview Resources : book.hacktricks.xyz/mobile-ap...
    Hacking Webviews : github.com/authenticationfail...
    Download APK : github.com/optiv/InsecureShop...
    InsecureShop : github.com/optiv/InsecureShop
    FB PoC : gist.github.com/LuD1161/1c867...
    Exploit PoC : gist.github.com/LuD1161/a1fc9...
    Report : ash-king.co.uk/facebook-bug-b...
    Command : adb shell am start -W -a android.intent.action.VIEW -d "insecureshop://com.insecureshop/web?url=aseemshrey.in"
    Pic : / 0*etdx
    ▬▬▬▬▬▬ 🔗 Other Links ▬▬▬▬▬▬
    💸 $100 Digital Ocean referral link :💸
    m.do.co/c/5e8e8b6c9c39
    Google FeedBack Form : forms.gle/rA9oy5wqN5GSLkh8A
    Discord : / discord
    Subreddit : / hackingsimplified
    Telegram : t.me/hackingsimplified42
    Hope it was worth your time.
    Stay tuned.
    Thank you everyone :)
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
    Disclaimer :
    These materials are for educational and research purposes only.
    Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! The creator of this video, nor anyone else affiliated in any way, is going to accept responsibility for your actions.
    ------------------------------------------------------------------------------------------------------------------------
    #Deeplink #HackingSimplified #AndroidHacking #beTheHACR #websecurity #howtohack #hack #howtobeahacker #hackingCourse #bugBounty #bug #bounty #hacker #freeHacking #freecourse
    hacking ,HackingSimplified, Hacking Simplified, Start Hacking ,Be The HACR, web security, how to be a hacker, free hacking, free hacking course, web security,hacking Course,bug Bounty,hacker,bug bounty,cyber security,bug bounty hunting, hacking

Комментарии • 40

  • @HackingSimplifiedAS
    @HackingSimplifiedAS  3 года назад +1

    If you like the video. Make sure to share the video :D

  • @usamazahoor3148

    Your concepts are clear that's why you teach in such a magnificent way...more power to you

  • @benedictcharles
    @benedictcharles 3 года назад +2

    Amazing content, the process and way its explained and the editing. Looking forward to move videos.

  • @ankittathe866
    @ankittathe866 3 года назад

    Everything you demonstrated here worth great value contents brother ! Keep going with this android series ! Best wishes !

  • @arijitgaming7317
    @arijitgaming7317 3 года назад

    thanks sir deeplink ka upar video lane ka liya ma is ka liya bhot din se wait kara raha tha🙏🙏

  • @yrks1109
    @yrks1109 3 года назад

    Amazing explanation man! keep it up! 🔥

  • @saivenkatmaheshwaram9868
    @saivenkatmaheshwaram9868 3 года назад +3

    bro next episodes try to complete owsap top 10 for android if u have time ...

  • @URKCS-kx3sf
    @URKCS-kx3sf 3 года назад +2

    Bro I didn't get any uri.getpath in webviewactivity why ?

  • @goodboy8833
    @goodboy8833 2 года назад

    Wonderful well explained. You plz continue this series

  • @HarshalChauhan_
    @HarshalChauhan_ 2 года назад

    Thanks man for this great video

  • @blackninja2.027
    @blackninja2.027 Год назад

    Could you please do the SSL pinning bypassing video with Frida. Please continue that series.

  • @aat2312
    @aat2312 3 года назад +1

    I found same issue on zomato app..that u demonstrated at

  • @itsm3dud39
    @itsm3dud39 21 день назад

    can you explain how an attacker can exploit this vulnerability? like you opened the url from your device. so how this going to attack a victim user?

  • @utkarshagrawal6060
    @utkarshagrawal6060 2 года назад

    Bro you wont believe, I liked your post and today I started to looking out in my feeds, as I wished about your content is expected as I wished, Great., aseem just one query: for exploiting deeplink we will have to check what activity it resolves to and then we have to check what activity is doing with the deeplink. So if we found any query parameters just like you, we can exploit it accordingly. Is it true?

  • @saurabhkumar760
    @saurabhkumar760 3 года назад

    Waiting for ssl pinning part😊

  • @saikiranlingadally1036
    @saikiranlingadally1036 3 года назад

    🔥

  • @trustedsecurity6039

    Please activate english subtile. Thanks for the awesome content like always

  • @medoll7118
    @medoll7118 3 года назад

    Nice 👍

  • @Vishal-ng2xb

    But how to fix this? what checks to put?

  • @thejulfikar
    @thejulfikar 2 года назад

    I just solved the lab only! Real apps are different! :/ What we can do now?